Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
04-01-2025 04:04
General
-
Target
-
Size
28KB
-
MD5
73ae74bcaae686577248f71b420f526e
-
SHA1
3bf6dee338fc55e656b71618d300387b57b3cc35
-
SHA256
bf4831f5071b38991eacd774c39a26473952b02775e0a227e7875c2cb8a24ce5
-
SHA512
af8d0b88f67786795a1b83fcb7c3415b85444721fcd820ff729adef538270ce996d2d92585449392310216664c91694c4f0c4a00c742aac4c40dbb2214a15e71
-
SSDEEP
384:1vxBbK26lj5Id8SpHx9jLhsznnVxA1WmP5w7GGCJlqqwMyNfqlc1d:Dv8IRRdsxq1DjJcqfoqlMd
Malware Config
Signatures
-
Detects MyDoom family 7 IoCs
resource yara_rule behavioral1/memory/2652-2-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral1/memory/2652-9-0x0000000000260000-0x0000000000268000-memory.dmp family_mydoom behavioral1/memory/2652-17-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral1/memory/2652-56-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral1/memory/2652-82-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral1/memory/2652-84-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral1/memory/2652-89-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom -
Mydoom family
-
Executes dropped EXE 1 IoCs
pid Process 2200 services.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" [email protected] Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
resource yara_rule behavioral1/memory/2652-2-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2652-4-0x0000000000260000-0x0000000000268000-memory.dmp upx behavioral1/files/0x0007000000016d31-7.dat upx behavioral1/memory/2200-11-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2652-9-0x0000000000260000-0x0000000000268000-memory.dmp upx behavioral1/memory/2652-17-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2200-20-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2200-21-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2200-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2200-31-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2200-33-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2200-38-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2200-43-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2200-45-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2200-50-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2200-55-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2652-56-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2200-57-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2200-62-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/files/0x0005000000004ed7-72.dat upx behavioral1/memory/2652-82-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2200-83-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2652-84-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2200-85-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2652-89-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2200-90-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe [email protected] File opened for modification C:\Windows\java.exe [email protected] File created C:\Windows\java.exe [email protected] -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2200 2652 [email protected] 31 PID 2652 wrote to memory of 2200 2652 [email protected] 31 PID 2652 wrote to memory of 2200 2652 [email protected] 31 PID 2652 wrote to memory of 2200 2652 [email protected] 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\[email protected]"C:\Users\Admin\AppData\Local\Temp\[email protected]"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD563bc103b204fef428df979518cc524ed
SHA194a2221e275ff0d9e0bf77f46c9c51c26b0454a2
SHA256fdb6aee64bf0a3a9f9ba25f0132ebd3b9c530c0b100a0fab09c714c4149e44cc
SHA51200b0f2dbeb9d4c748f340d1b152b3849639c045599dba4a028e907a94400046e172aaa9c6ec29e269032fa3ac1b042532bee130c2a5fe2cd0d784dc5571cca16
-
Filesize
1KB
MD5f360f3be72e781fcb08da826492db583
SHA1fec26b194dbdf6a267f03f0eac91e52b06b52fd8
SHA2560b333a58228ee7fa88e9272217b2ff62d87bf0b65b77317b32d19c18e29a43d5
SHA512350d7e992604ee891f2e0a699989e4b891b2a5863472d6edcf74a1c20a1b165325b33a8cc51aafaefa1af4d6c24d941f4f79a29a71aa70a26e779a160db46a64
-
Filesize
1KB
MD56c04d7bf4a8258d70f60744f26f5ae74
SHA1733e69a1f1c4c589aee4dadf59b876dbafb028b7
SHA256243531611d79f35345fe862d1a4b2dc260e8c2ccebc3d138774d072db55c2dba
SHA5128fefc67e6e948b4b328e32c58fecdcb169f7c329a51d4a20d6e78548023f460d8a560d9d571cf96cd306f81c5f974b5d297b7b6cf079439b5881ba1b148f4727
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2