Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 08:42
Behavioral task
behavioral1
Sample
c921bcdba01bc7e3fea159c203a157b74733978ab738378571e100e769f6aebdN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
c921bcdba01bc7e3fea159c203a157b74733978ab738378571e100e769f6aebdN.exe
Resource
win10v2004-20241007-en
General
-
Target
c921bcdba01bc7e3fea159c203a157b74733978ab738378571e100e769f6aebdN.exe
-
Size
29KB
-
MD5
bb2a7b59bbf9cfc488fc204488b4d9a0
-
SHA1
ae84343d3d045540de7d56a25178a5abd59e7ebf
-
SHA256
c921bcdba01bc7e3fea159c203a157b74733978ab738378571e100e769f6aebd
-
SHA512
1d2f5473167e568bbccd9d7621331df275781be0a49d64431f3051b6b12888e5e2b4fd6417a5fbd5bb4f855cf711c2230ac9d443ee43162046ca94970c978ff9
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/RhQ:AEwVs+0jNDY1qi/qZm
Malware Config
Signatures
-
Detects MyDoom family 8 IoCs
resource yara_rule behavioral1/memory/1056-16-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/1056-30-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/1056-53-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/1056-55-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/1056-60-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/1056-65-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/1056-67-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/1056-72-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom -
Mydoom family
-
Executes dropped EXE 1 IoCs
pid Process 1740 services.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" c921bcdba01bc7e3fea159c203a157b74733978ab738378571e100e769f6aebdN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
resource yara_rule behavioral1/memory/1056-0-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/1056-4-0x0000000000220000-0x0000000000228000-memory.dmp upx behavioral1/files/0x0028000000016fe5-7.dat upx behavioral1/memory/1740-10-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1056-16-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/1740-18-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1740-19-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1740-24-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1740-29-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1056-30-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/1740-31-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1740-36-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/files/0x0007000000018b28-41.dat upx behavioral1/memory/1056-53-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/1740-54-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1056-55-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/1740-56-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1056-60-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/1740-61-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1056-65-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/1740-66-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1056-67-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/1740-68-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1056-72-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/1740-73-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\java.exe c921bcdba01bc7e3fea159c203a157b74733978ab738378571e100e769f6aebdN.exe File created C:\Windows\services.exe c921bcdba01bc7e3fea159c203a157b74733978ab738378571e100e769f6aebdN.exe File opened for modification C:\Windows\java.exe c921bcdba01bc7e3fea159c203a157b74733978ab738378571e100e769f6aebdN.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c921bcdba01bc7e3fea159c203a157b74733978ab738378571e100e769f6aebdN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1056 wrote to memory of 1740 1056 c921bcdba01bc7e3fea159c203a157b74733978ab738378571e100e769f6aebdN.exe 29 PID 1056 wrote to memory of 1740 1056 c921bcdba01bc7e3fea159c203a157b74733978ab738378571e100e769f6aebdN.exe 29 PID 1056 wrote to memory of 1740 1056 c921bcdba01bc7e3fea159c203a157b74733978ab738378571e100e769f6aebdN.exe 29 PID 1056 wrote to memory of 1740 1056 c921bcdba01bc7e3fea159c203a157b74733978ab738378571e100e769f6aebdN.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c921bcdba01bc7e3fea159c203a157b74733978ab738378571e100e769f6aebdN.exe"C:\Users\Admin\AppData\Local\Temp\c921bcdba01bc7e3fea159c203a157b74733978ab738378571e100e769f6aebdN.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD52c895397643b635f852e20b14c682d93
SHA14a9939851d93a43e87926c55a5ab356ab8160543
SHA256fbbe5b9db297b155b6129bcc1d077ed3c4b4e0b0251d11a8002a2b82e6681fef
SHA512d22125685fae24fd3936a991951ef104a0a54b4f11d5a1b478c4e352f7a38d346d7ad299e0ab1a7356728c1f622c612465284fc57ab8e2297593de41f0ecbb4c
-
Filesize
320B
MD5a87c1d763dd270744c435f6dc2a50093
SHA13d533daa907b43d6d2a695f0a09140fcb2fabb61
SHA256803969f47f1dc1cf7df461dd999c22b7acb512a543a68a9b8d94f2f6e1e1867c
SHA512bc2aca6cf409f81c8835fa696433240b04da7104aa9306f79b1daaeb5ff63e738e9e4a26589d7b3633bd08ff63266d70ea41b2d8cad188839d78820f3f197395
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2