Analysis
-
max time kernel
120s -
max time network
115s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-01-2025 13:04
Behavioral task
behavioral1
Sample
9cbe5df67bba06741551b959c36d93f3c6c4e760dd65135949cd5785423ae32bN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9cbe5df67bba06741551b959c36d93f3c6c4e760dd65135949cd5785423ae32bN.exe
Resource
win10v2004-20241007-en
General
-
Target
9cbe5df67bba06741551b959c36d93f3c6c4e760dd65135949cd5785423ae32bN.exe
-
Size
28KB
-
MD5
7ac8519739efea6f047844a4d31ac290
-
SHA1
51774cb59441595bdaf4ef651b80368ddd509a33
-
SHA256
9cbe5df67bba06741551b959c36d93f3c6c4e760dd65135949cd5785423ae32b
-
SHA512
a5e3d46e3dea2c240f1024456cbf672605b4926032ffbf5f2bac8e08b41928458fb36a3c435b2ed8eac46882736a17ecfcc6ac70c12e6359bf5f98dd7d5de7b7
-
SSDEEP
384:1vxBbK26lj5Id8SpHx9jLhsznnVxA1WmP5w7GGCJlqqwMyN+P/9Ej:Dv8IRRdsxq1DjJcqfNH9g
Malware Config
Signatures
-
Detects MyDoom family 7 IoCs
resource yara_rule behavioral1/memory/2520-16-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral1/memory/2520-41-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral1/memory/2520-43-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral1/memory/2520-64-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral1/memory/2520-69-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral1/memory/2520-71-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral1/memory/2520-76-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom -
Mydoom family
-
Executes dropped EXE 1 IoCs
pid Process 2084 services.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 9cbe5df67bba06741551b959c36d93f3c6c4e760dd65135949cd5785423ae32bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
resource yara_rule behavioral1/memory/2520-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2520-4-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/files/0x0008000000016c4e-7.dat upx behavioral1/memory/2520-16-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2084-19-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2084-20-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2084-25-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2084-30-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2084-32-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2084-37-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2520-41-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2084-42-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2520-43-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x0005000000004ed7-53.dat upx behavioral1/memory/2084-61-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2520-64-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2084-65-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2520-69-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2084-70-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2520-71-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2084-72-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2084-77-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2520-76-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe 9cbe5df67bba06741551b959c36d93f3c6c4e760dd65135949cd5785423ae32bN.exe File opened for modification C:\Windows\java.exe 9cbe5df67bba06741551b959c36d93f3c6c4e760dd65135949cd5785423ae32bN.exe File created C:\Windows\java.exe 9cbe5df67bba06741551b959c36d93f3c6c4e760dd65135949cd5785423ae32bN.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9cbe5df67bba06741551b959c36d93f3c6c4e760dd65135949cd5785423ae32bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2084 2520 9cbe5df67bba06741551b959c36d93f3c6c4e760dd65135949cd5785423ae32bN.exe 31 PID 2520 wrote to memory of 2084 2520 9cbe5df67bba06741551b959c36d93f3c6c4e760dd65135949cd5785423ae32bN.exe 31 PID 2520 wrote to memory of 2084 2520 9cbe5df67bba06741551b959c36d93f3c6c4e760dd65135949cd5785423ae32bN.exe 31 PID 2520 wrote to memory of 2084 2520 9cbe5df67bba06741551b959c36d93f3c6c4e760dd65135949cd5785423ae32bN.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\9cbe5df67bba06741551b959c36d93f3c6c4e760dd65135949cd5785423ae32bN.exe"C:\Users\Admin\AppData\Local\Temp\9cbe5df67bba06741551b959c36d93f3c6c4e760dd65135949cd5785423ae32bN.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2084
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5b655e2bbe90a398914f0c743ab3a1934
SHA1fea8ebd202a4534c5a8640efc22772738ac16973
SHA2561349524293e9b8ce90a628344c9e453cf030c2574371e039281b5010a80c40c1
SHA5123e322495c8c1fcfb54f487f0a2fc2582e3d79764fb1df1ef662f9cee670a0f6da27dcd02357f80affebcc509ae35254d2394a15d10da6aa74fd3999a8eabb3ce
-
Filesize
1KB
MD5cb95715a7ca222fcf30f7d6abcc51820
SHA1a587e62cd3ca7eea874301c1911187a9f084dba1
SHA25691a8078a08b312d5c9ecf098796dce5b5e50aa5cdc6662cc9e00b8a6ad3ddbf1
SHA51287b4950544d2b04e52464a2d9a653156df7fdfd611f017ded83fd6a0b56d7199afb6547cc922770ba84dcdab6f4ab6408e8913c491d8bd69b87621dc3038df89
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2