Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-01-2025 01:11
Behavioral task
behavioral1
Sample
21a565658741c7ee34924b761cbf5ed64a919e4b6ffe8d009a2f3a9d564d2fb3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
21a565658741c7ee34924b761cbf5ed64a919e4b6ffe8d009a2f3a9d564d2fb3.exe
Resource
win10v2004-20241007-en
General
-
Target
21a565658741c7ee34924b761cbf5ed64a919e4b6ffe8d009a2f3a9d564d2fb3.exe
-
Size
29KB
-
MD5
b8f02c09a0bf39f7227fe82419e07d17
-
SHA1
dcd77158360e3ecc5f136091948c2d5764d822c6
-
SHA256
21a565658741c7ee34924b761cbf5ed64a919e4b6ffe8d009a2f3a9d564d2fb3
-
SHA512
e61cdc0bbd378aad17e0553c99ba55c044b77d4588cb7007d23e4c2b5b3cd34b1c64fbfb1c29e15e3cb3b8514bcba643148fcafe9895fbde788ce662972d7853
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/gS:AEwVs+0jNDY1qi/qX
Malware Config
Signatures
-
Detects MyDoom family 5 IoCs
resource yara_rule behavioral1/memory/2828-17-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/2828-49-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/2828-54-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/2828-70-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/2828-74-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom -
Mydoom family
-
Executes dropped EXE 1 IoCs
pid Process 2864 services.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 21a565658741c7ee34924b761cbf5ed64a919e4b6ffe8d009a2f3a9d564d2fb3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
resource yara_rule behavioral1/memory/2828-0-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2828-4-0x0000000000270000-0x0000000000278000-memory.dmp upx behavioral1/files/0x000700000001878d-7.dat upx behavioral1/memory/2864-11-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2828-17-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2864-20-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2864-21-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2864-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2864-31-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2864-33-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2864-38-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2864-43-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2864-45-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2828-49-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2864-50-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2828-54-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2864-55-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/files/0x003e000000018662-65.dat upx behavioral1/memory/2828-70-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2864-71-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2828-74-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2864-75-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe 21a565658741c7ee34924b761cbf5ed64a919e4b6ffe8d009a2f3a9d564d2fb3.exe File opened for modification C:\Windows\java.exe 21a565658741c7ee34924b761cbf5ed64a919e4b6ffe8d009a2f3a9d564d2fb3.exe File created C:\Windows\java.exe 21a565658741c7ee34924b761cbf5ed64a919e4b6ffe8d009a2f3a9d564d2fb3.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 21a565658741c7ee34924b761cbf5ed64a919e4b6ffe8d009a2f3a9d564d2fb3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2828 wrote to memory of 2864 2828 21a565658741c7ee34924b761cbf5ed64a919e4b6ffe8d009a2f3a9d564d2fb3.exe 30 PID 2828 wrote to memory of 2864 2828 21a565658741c7ee34924b761cbf5ed64a919e4b6ffe8d009a2f3a9d564d2fb3.exe 30 PID 2828 wrote to memory of 2864 2828 21a565658741c7ee34924b761cbf5ed64a919e4b6ffe8d009a2f3a9d564d2fb3.exe 30 PID 2828 wrote to memory of 2864 2828 21a565658741c7ee34924b761cbf5ed64a919e4b6ffe8d009a2f3a9d564d2fb3.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\21a565658741c7ee34924b761cbf5ed64a919e4b6ffe8d009a2f3a9d564d2fb3.exe"C:\Users\Admin\AppData\Local\Temp\21a565658741c7ee34924b761cbf5ed64a919e4b6ffe8d009a2f3a9d564d2fb3.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5bf8d6335bac7ad8e828ab45268f4bd81
SHA1fa1301fb6bdd5b799efdccb2bbe2b76da4b057c2
SHA2565065b4e854d5fadd32eb22c498a972dbd52881a979fcc65a07fff3ccf9288b69
SHA512e308621f211fafab5b86737858a5c1b1dca34cb6315845e43bf01cd2fba2c040fd1b806ec4a98973967554d014bdb8d718316a4b0beecad2f9c6f4a79bdf16ee
-
Filesize
352B
MD5fcbe402ab7b3a69dead8f4dc55c7b14d
SHA1f78dc6ac2b042ec6d2b622d791aad14109245bd6
SHA256465de918c488e4c32f8a3b837df00414e094aeeb2b640db1d632666c025ddb63
SHA51271f010bb518317ceda3e4a0373b52ecf4bdc91f0988fbac5a6091cd39115e9f6dbd46f57c525108af073fd22e0b057afacd05512810e87e65679954ae6b9ff67
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2