Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 23:35
Behavioral task
behavioral1
Sample
ab8e6af135dcf866e5a5efb630dc1187a004dc910c8de0c43f0e85ba8cae8c50N.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
ab8e6af135dcf866e5a5efb630dc1187a004dc910c8de0c43f0e85ba8cae8c50N.exe
Resource
win10v2004-20241007-en
General
-
Target
ab8e6af135dcf866e5a5efb630dc1187a004dc910c8de0c43f0e85ba8cae8c50N.exe
-
Size
29KB
-
MD5
b2413490d451f5b1fa504cd683c7a6f0
-
SHA1
d9d0de756afd8b165564f8dbfa0b16f206fc7f1a
-
SHA256
ab8e6af135dcf866e5a5efb630dc1187a004dc910c8de0c43f0e85ba8cae8c50
-
SHA512
bc47e1bcb84c902d1eb8b7098d862de183b21af51dd2075a13f63155ecca59a6cc13ea409cd54db35223d5ed89cd5c90b5e539d27b7fe4dac0a00fd4ee837133
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/fhQ:AEwVs+0jNDY1qi/qHm
Malware Config
Signatures
-
Detects MyDoom family 5 IoCs
resource yara_rule behavioral2/memory/628-13-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/628-39-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/628-44-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/628-136-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/628-167-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom -
Mydoom family
-
Executes dropped EXE 1 IoCs
pid Process 4456 services.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" ab8e6af135dcf866e5a5efb630dc1187a004dc910c8de0c43f0e85ba8cae8c50N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
resource yara_rule behavioral2/memory/628-0-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/files/0x000e000000023a3a-4.dat upx behavioral2/memory/4456-5-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/628-13-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/4456-15-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4456-16-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4456-21-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4456-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4456-28-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4456-33-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4456-38-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/628-39-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/4456-40-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/628-44-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/4456-45-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/files/0x0002000000022187-50.dat upx behavioral2/memory/628-136-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/4456-137-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/628-167-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/4456-168-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4456-172-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe ab8e6af135dcf866e5a5efb630dc1187a004dc910c8de0c43f0e85ba8cae8c50N.exe File opened for modification C:\Windows\java.exe ab8e6af135dcf866e5a5efb630dc1187a004dc910c8de0c43f0e85ba8cae8c50N.exe File created C:\Windows\java.exe ab8e6af135dcf866e5a5efb630dc1187a004dc910c8de0c43f0e85ba8cae8c50N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab8e6af135dcf866e5a5efb630dc1187a004dc910c8de0c43f0e85ba8cae8c50N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 628 wrote to memory of 4456 628 ab8e6af135dcf866e5a5efb630dc1187a004dc910c8de0c43f0e85ba8cae8c50N.exe 84 PID 628 wrote to memory of 4456 628 ab8e6af135dcf866e5a5efb630dc1187a004dc910c8de0c43f0e85ba8cae8c50N.exe 84 PID 628 wrote to memory of 4456 628 ab8e6af135dcf866e5a5efb630dc1187a004dc910c8de0c43f0e85ba8cae8c50N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab8e6af135dcf866e5a5efb630dc1187a004dc910c8de0c43f0e85ba8cae8c50N.exe"C:\Users\Admin\AppData\Local\Temp\ab8e6af135dcf866e5a5efb630dc1187a004dc910c8de0c43f0e85ba8cae8c50N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
29KB
MD5fc38e8c43fbcebfd2406abb981775a15
SHA1009e25f0c4516e59bb677ab8977fbdc594fd0e45
SHA256857acda1862da5b653b885e0b07e4888b871854cb3a4ac9acc85c3392d7c905f
SHA5127da5174e3d92bcc61b8c4eb822d97005c7d40512c1780206263345653fc5f72a83b2a97f2868ddde9e1ad8389f177b18fbcb4aa35cffd3eebaf24c9a7cfeb853
-
Filesize
320B
MD536e5e131b1d35003f93fdc4790294649
SHA1e8154219baeb3be8ce3af8fe2cf5e7d664ea3bbf
SHA2569bdf03aba0e95dc1bcde687d066739063b08de24c5235ac39177abd43ff2baa5
SHA5128ab7d9f00318cdf63f89ff5be717374baaba77608b969d3d82a21f95bbe5cfeb8af6f1e506c0b5d7861f026a00598816ae310c6d6b95e58f279fc367faf035b7
-
Filesize
320B
MD5f698b5ae330836a8de6b6898c04b55a3
SHA1b40263bad14cacb3a71721473a9becd5a7cf32ec
SHA25613f95ecd92c65f15ccf9c00a684ee17a4a4cde07807e4361f0a54bf36584c2e7
SHA512117c6513203e9a40009d2d4d7d44c7181c2e3e13538f9e279fe7a0cbc96a0918b114fb9cb0a86a9ed504440b734a55b51f12c6a1787779847ecebb479aef4738
-
Filesize
320B
MD523c6763db81feac488c41f2e36609028
SHA107cf810d69ecd6fa8f3839f22c4e48c9c8fd535a
SHA25605326411cb34c1875a6e883ea393ee652b18c0e7d2c90824da9bb4c3a7f4409f
SHA512f49ad6992be3918bb14d0fba18f15ec5f321366be3354e4d2c292e71da50987214b86016255c16120ead86988d1a0f549e515c8b2bc2a9048c9130812ed01b87
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2