Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 02:42
Behavioral task
behavioral1
Sample
dwmmoowmbkz.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dwmmoowmbkz.exe
Resource
win10v2004-20241007-en
General
-
Target
dwmmoowmbkz.exe
-
Size
51KB
-
MD5
f217b9268597022851016736519f50c6
-
SHA1
ea10562fbb5232d6a39a1c7c021f3820281f606b
-
SHA256
f92908b7940b96d47a62a404a08828aae33a44674ed98124db287d18da54dff4
-
SHA512
06b2b2dd58ad8a4bdd14655fdb6c3a05ca5fa25543bd455d3122398f9eccf4c8580b23f934d19378fbc82a86bf4886577f3144ce498888dd416a096ae16a6f8b
-
SSDEEP
1536:ae8SMuDd+fK3F6Xs6XdodKA7Dk/Ht0fantpj7B:aeRrAVAPkisHN
Malware Config
Signatures
-
Detects MyDoom family 15 IoCs
resource yara_rule behavioral2/memory/1520-88-0x0000000000500000-0x000000000050F000-memory.dmp family_mydoom behavioral2/memory/1520-89-0x0000000000500000-0x000000000050F000-memory.dmp family_mydoom behavioral2/memory/1520-143-0x0000000000500000-0x000000000050F000-memory.dmp family_mydoom behavioral2/memory/1520-162-0x0000000000500000-0x000000000050F000-memory.dmp family_mydoom behavioral2/memory/1520-169-0x0000000000500000-0x000000000050F000-memory.dmp family_mydoom behavioral2/memory/1520-179-0x0000000000500000-0x000000000050F000-memory.dmp family_mydoom behavioral2/memory/1520-189-0x0000000000500000-0x000000000050F000-memory.dmp family_mydoom behavioral2/memory/1520-198-0x0000000000500000-0x000000000050F000-memory.dmp family_mydoom behavioral2/memory/1520-206-0x0000000000500000-0x000000000050F000-memory.dmp family_mydoom behavioral2/memory/1520-209-0x0000000000500000-0x000000000050F000-memory.dmp family_mydoom behavioral2/memory/1520-212-0x0000000000500000-0x000000000050F000-memory.dmp family_mydoom behavioral2/memory/1520-215-0x0000000000500000-0x000000000050F000-memory.dmp family_mydoom behavioral2/memory/1520-218-0x0000000000500000-0x000000000050F000-memory.dmp family_mydoom behavioral2/memory/1520-221-0x0000000000500000-0x000000000050F000-memory.dmp family_mydoom behavioral2/memory/1520-232-0x0000000000500000-0x000000000050F000-memory.dmp family_mydoom -
Mydoom family
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000c000000023b9a-2.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 1520 dwmmoowmbkz.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\qwjjm = "C:\\Windows\\system32\\igmeegy.exe" dwmmoowmbkz.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\nnrumt.dll dwmmoowmbkz.exe File opened for modification C:\Windows\SysWOW64\igmeegy.exe dwmmoowmbkz.exe File created C:\Windows\SysWOW64\igmeegy.exe dwmmoowmbkz.exe -
resource yara_rule behavioral2/memory/1520-0-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/files/0x000c000000023b9a-2.dat upx behavioral2/memory/1520-4-0x0000000075000000-0x0000000075007000-memory.dmp upx behavioral2/files/0x0008000000023c1d-28.dat upx behavioral2/memory/1520-88-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/memory/1520-89-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/memory/1520-90-0x0000000075000000-0x0000000075007000-memory.dmp upx behavioral2/memory/1520-143-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/memory/1520-162-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/memory/1520-169-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/memory/1520-179-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/memory/1520-189-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/memory/1520-198-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/memory/1520-206-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/memory/1520-209-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/memory/1520-212-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/memory/1520-215-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/memory/1520-218-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/memory/1520-221-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/memory/1520-232-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\ulqrqzhgl.zip dwmmoowmbkz.exe File created C:\Program Files\Common Files\microsoft shared\VSTO\qkaj.exe dwmmoowmbkz.exe File created C:\Program Files\VideoLAN\VLC\lua\http\css\rhmrwo.zip dwmmoowmbkz.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\RTL\contrast-white\ojdvf.zip dwmmoowmbkz.exe File created C:\Program Files\Common Files\microsoft shared\yttwghneij.zip dwmmoowmbkz.exe File created C:\Program Files\Common Files\microsoft shared\Triedit\en-US\nogq.zip dwmmoowmbkz.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\cs\bauwts.zip dwmmoowmbkz.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ru\ilxpisaryazn.exe dwmmoowmbkz.exe File created C:\Program Files\Common Files\microsoft shared\ink\da-DK\mhsooihssgj.zip dwmmoowmbkz.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ko\cheqjerzcvto.zip dwmmoowmbkz.exe File created C:\Program Files\VideoLAN\VLC\locale\lt\LC_MESSAGES\aerlwgs.zip dwmmoowmbkz.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknumpad\yfrjweci.zip dwmmoowmbkz.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pt-BR\qfktcet.zip dwmmoowmbkz.exe File created C:\Program Files\VideoLAN\VLC\locale\ff\uiwexypcflynv.exe dwmmoowmbkz.exe File created C:\Program Files\Windows Photo Viewer\en-US\ddmkrohxjwk.exe dwmmoowmbkz.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ru\hbuinksfousbe.zip dwmmoowmbkz.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\bioskjoscjr.exe dwmmoowmbkz.exe File created C:\Program Files\VideoLAN\VLC\locale\is\aoqfvtxlofavg.zip dwmmoowmbkz.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Microsoft.Msn.Controls\EndOfLife\Assets\iqzm.zip dwmmoowmbkz.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\STUDIO\nazv.zip dwmmoowmbkz.exe File created C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\kobjrxwcjrr.zip dwmmoowmbkz.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\es\fizs.exe dwmmoowmbkz.exe File created C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\AppxMetadata\lpkaubqsdanj.zip dwmmoowmbkz.exe File created C:\Program Files\VideoLAN\VLC\locale\ro\LC_MESSAGES\auehriuxvbt.zip dwmmoowmbkz.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\es\gawd.zip dwmmoowmbkz.exe File created C:\Program Files\VideoLAN\VLC\locale\fy\cedzadqxvxvp.exe dwmmoowmbkz.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\cs\pimjzk.zip dwmmoowmbkz.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\zh-Hant\cwzkaiuzqayfj.zip dwmmoowmbkz.exe File created C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.1813.0_neutral_~_8wekyb3d8bbwe\ipkkpdfzn.zip dwmmoowmbkz.exe File created C:\Program Files\Common Files\microsoft shared\ink\es-MX\homjf.zip dwmmoowmbkz.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\de\reyinf.zip dwmmoowmbkz.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\pl\npbctgh.zip dwmmoowmbkz.exe File created C:\Program Files\VideoLAN\VLC\plugins\mux\rpljwkrpzx.zip dwmmoowmbkz.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\kn-IN\rhaajfow.zip dwmmoowmbkz.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\alsdkbfor.zip dwmmoowmbkz.exe File created C:\Program Files\Common Files\microsoft shared\ink\sk-SK\qvtzytbquue.exe dwmmoowmbkz.exe File created C:\Program Files\Common Files\microsoft shared\VGX\xcuweaasvn.zip dwmmoowmbkz.exe File created C:\Program Files\Microsoft Office\root\Office16\MEDIA\ajrvlfotka.exe dwmmoowmbkz.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\ixdu.zip dwmmoowmbkz.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\MEIPreload\otylzab.zip dwmmoowmbkz.exe File created C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\dfnui.zip dwmmoowmbkz.exe File created C:\Program Files\Common Files\microsoft shared\ink\fr-CA\xlajbpuiu.zip dwmmoowmbkz.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\njnrdkbktdrxr.exe dwmmoowmbkz.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\zh-Hans\dthkeyvfti.zip dwmmoowmbkz.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Images\llyaurnps.zip dwmmoowmbkz.exe File created C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\Assets\blsevsnibd.exe dwmmoowmbkz.exe File created C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.1813.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\fnynbm.zip dwmmoowmbkz.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\qophnlvkxidmj.zip dwmmoowmbkz.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\it\onipuzl.exe dwmmoowmbkz.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav\buyenw.zip dwmmoowmbkz.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\AppxMetadata\vrxa.zip dwmmoowmbkz.exe File created C:\Program Files\Common Files\microsoft shared\ink\pt-PT\pykrlppz.zip dwmmoowmbkz.exe File created C:\Program Files\Common Files\microsoft shared\VC\tgebr.zip dwmmoowmbkz.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\RTL\utzq.zip dwmmoowmbkz.exe File created C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\FileAssociation\mmodh.exe dwmmoowmbkz.exe File created C:\Program Files\WindowsApps\Microsoft.Wallet_2.4.18324.0_x64__8wekyb3d8bbwe\AppxMetadata\ysdqxrrelp.zip dwmmoowmbkz.exe File created C:\Program Files\Common Files\microsoft shared\ink\HWRCustomization\tpgjx.exe dwmmoowmbkz.exe File created C:\Program Files\VideoLAN\VLC\lua\intf\bglluihwnq.zip dwmmoowmbkz.exe File created C:\Program Files\Common Files\microsoft shared\TextConv\lafbmha.zip dwmmoowmbkz.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-white\ulmuqdt.zip dwmmoowmbkz.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\vruqvhcexvmzd.zip dwmmoowmbkz.exe File created C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\thwhmtiqvgt.zip dwmmoowmbkz.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pl\ngflvby.zip dwmmoowmbkz.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsSoundRecorder_10.1906.1972.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\jomsnsdfuqgss.zip dwmmoowmbkz.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwmmoowmbkz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe 1520 dwmmoowmbkz.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1520 wrote to memory of 1116 1520 dwmmoowmbkz.exe 82 PID 1520 wrote to memory of 1116 1520 dwmmoowmbkz.exe 82 PID 1520 wrote to memory of 1116 1520 dwmmoowmbkz.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\dwmmoowmbkz.exe"C:\Users\Admin\AppData\Local\Temp\dwmmoowmbkz.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\notepad.exenotepad "C:\Users\Admin\AppData\Local\Temp\Text"2⤵
- System Location Discovery: System Language Discovery
PID:1116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD5f217b9268597022851016736519f50c6
SHA1ea10562fbb5232d6a39a1c7c021f3820281f606b
SHA256f92908b7940b96d47a62a404a08828aae33a44674ed98124db287d18da54dff4
SHA51206b2b2dd58ad8a4bdd14655fdb6c3a05ca5fa25543bd455d3122398f9eccf4c8580b23f934d19378fbc82a86bf4886577f3144ce498888dd416a096ae16a6f8b
-
Filesize
2KB
MD57868a41b72dd1154d8524a72e8995c5e
SHA1498e4c51513234727ab0615c78fe4632c122b31d
SHA25657142aa573cc75b64b4a25ea42ffa3e56f4ec87fc32f08da35da2d18e68ee81c
SHA512d1bff4f9a2098b559c907af3331e6ff99387b98cde6bef9eb747c99d3bb9af00b2f71ccb532ab7b612dc36d66d4718ebb101040ce3db371d1ba1b7ee04540449
-
Filesize
7KB
MD51ed67c6efea9971a4db6fdd565d0fce7
SHA1c218198786a92b5ce076bf5618b414630655c4ed
SHA25658a8614377da7d1db7d9c454584273005122b2b4a06225664e1c97b130a28789
SHA512625b581acc61625e2c474d6966ea9d243561c667e377efb47cae0306071b58352e9fc71a32d6f591cb15797e9577ded4e7dd08c91862f90acc96e6230e08d2f2