Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 06:48
Behavioral task
behavioral1
Sample
iobox.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
iobox.exe
Resource
win10v2004-20241007-en
General
-
Target
iobox.exe
-
Size
28KB
-
MD5
f4c12a1441daa2eaebd5513fa1e819f8
-
SHA1
bff3bde8c92535e7b9ac663fd842e82b599cdadc
-
SHA256
82485e15c4348b2bbfcca570a113395bf3dbe45403a28216dd38c0d0259e6f36
-
SHA512
a881f40caf6963410f2fd65e75117903e40e3829119d7284062e14bdf495a500050eeb27eb92699aeb60b5e3f945edd987f7ab723b2e7cbedb4c804eac4ccc91
-
SSDEEP
384:1vxBbK26lj5Id8SpHx9jLhsznnVxA1WmP5w7GGCJlqqwMyNpJmpx:Dv8IRRdsxq1DjJcqfkEx
Malware Config
Signatures
-
Detects MyDoom family 7 IoCs
resource yara_rule behavioral2/memory/4456-13-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral2/memory/4456-44-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral2/memory/4456-112-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral2/memory/4456-172-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral2/memory/4456-176-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral2/memory/4456-183-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral2/memory/4456-219-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom -
Mydoom family
-
Executes dropped EXE 1 IoCs
pid Process 3792 services.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" iobox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
resource yara_rule behavioral2/memory/4456-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/files/0x000b000000023b83-4.dat upx behavioral2/memory/3792-6-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4456-13-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3792-15-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3792-16-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3792-21-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3792-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3792-28-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3792-33-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3792-38-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3792-40-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4456-44-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3792-45-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/files/0x0003000000022187-58.dat upx behavioral2/memory/4456-112-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3792-113-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4456-172-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3792-173-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4456-176-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3792-177-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3792-182-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4456-183-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3792-184-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4456-219-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3792-220-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe iobox.exe File opened for modification C:\Windows\java.exe iobox.exe File created C:\Windows\java.exe iobox.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iobox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4456 wrote to memory of 3792 4456 iobox.exe 83 PID 4456 wrote to memory of 3792 4456 iobox.exe 83 PID 4456 wrote to memory of 3792 4456 iobox.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\iobox.exe"C:\Users\Admin\AppData\Local\Temp\iobox.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312B
MD5c15952329e9cd008b41f979b6c76b9a2
SHA153c58cc742b5a0273df8d01ba2779a979c1ff967
SHA2565d065a88f9a1fb565c2d70e87148d469dd9dcbbefea4ccc8c181745eda748ab7
SHA5126aecdd949abcd2cb54e2fe3e1171ee47c247aa3980a0847b9934f506ef9b2d3180831adf6554c68b0621f9f9f3cd88767ef9487bc6e51cecd6a8857099a7b296
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
28KB
MD58d55e9450928619df26a6197d38589ea
SHA1a441df7761e936305a78395e1a70245e9646b1f4
SHA256a08988b3ea7c9779a0e82a93dc74e38794bc1dea1ec88c9b2daded2db88fef10
SHA512f57528536f934456805b3e020c4b3fbc3801c87372fb5fec0cf120d772981f6313458280aa17ea54ebbd447df320cab60f7e3ef5a5b5c4a0ab4a605d625889ab
-
Filesize
1KB
MD5db1d69e84fdbf819488fd51e1ec598d2
SHA18cfee951dee5d994bf92f2da6a8cc56ebfdb6280
SHA2567e6b0113be9228ec53f0f8fe07cb05a87c6778268d1ad385d87e9331da817b70
SHA5126d3643ec6544f5ecc55ceec1b21e8d8791749458f0d61ff819ad00c8757809c7e453d5546fbd58928a4462571b3baf79b1214c48c389fbef7fe558c961867e48
-
Filesize
1KB
MD5859d454de065cad31cf7897cd9f58483
SHA1a2b162a45fe2c9eb5c7f89172217335880dcdb98
SHA256072c8fa8e50bc1d895a7fa54815d816778361edae2f23d6e147ba5471deddb7c
SHA51214fef4b90422579994e0e3d98ddfd448778660504c6c41a8e63afcbdbe412a7022401e96d2223a98c769b1d901f9d753fb96735938483d72ddd991ae98f891f9
-
Filesize
1KB
MD5bd86e684aa456809a41ab6d1d473271e
SHA1110de8d557bf63dbe442f20e2152be7e7dcc1440
SHA256e20aeb6adf11c4f9da96914cae52e4843965fa492444098665681d5fba58c078
SHA512c3fa5215740a8548c0b589eaaa23aedbbeefb9e2203b3fd0c96815210796b6d55bf59f8de6f982d7f8ced16bbf203760ca7d6cd6ea9fcb116f8cdf467912baeb
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2