Analysis
-
max time kernel
57s -
max time network
59s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2025 16:49
Behavioral task
behavioral1
Sample
605a7e9ff88673d278fe5146464280ac7a9601b48ab71bc816f5db3c0ba86609.exe
Resource
win10v2004-20241007-en
General
-
Target
605a7e9ff88673d278fe5146464280ac7a9601b48ab71bc816f5db3c0ba86609.exe
-
Size
29KB
-
MD5
3b2dc4dad3c5ce4ea2eb8a9605d406cd
-
SHA1
d894f18cc5e3b2d75fdfa60eb8ed9c8ddf922792
-
SHA256
605a7e9ff88673d278fe5146464280ac7a9601b48ab71bc816f5db3c0ba86609
-
SHA512
2ccbda37d4bffce082f01136b4a928124e7bedf6695f825e0c874bf913d36e342c5f899d829513480ef5626763451326adbeef5afb36ebf05428a005360e7bdd
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/7hQ:AEwVs+0jNDY1qi/qDm
Malware Config
Signatures
-
Detects MyDoom family 1 IoCs
resource yara_rule behavioral1/memory/3052-13-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom -
Mydoom family
-
Executes dropped EXE 1 IoCs
pid Process 572 services.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 605a7e9ff88673d278fe5146464280ac7a9601b48ab71bc816f5db3c0ba86609.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe -
resource yara_rule behavioral1/memory/3052-0-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/572-5-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/files/0x0008000000023c88-4.dat upx behavioral1/memory/3052-13-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/572-16-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/572-15-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/572-24-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/572-62-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/572-86-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/572-97-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe File created C:\Windows\services.exe 605a7e9ff88673d278fe5146464280ac7a9601b48ab71bc816f5db3c0ba86609.exe File opened for modification C:\Windows\java.exe 605a7e9ff88673d278fe5146464280ac7a9601b48ab71bc816f5db3c0ba86609.exe File created C:\Windows\java.exe 605a7e9ff88673d278fe5146464280ac7a9601b48ab71bc816f5db3c0ba86609.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2516 3304 WerFault.exe 103 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 605a7e9ff88673d278fe5146464280ac7a9601b48ab71bc816f5db3c0ba86609.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2564 mspaint.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{B98A01FD-CEA9-11EF-BDBF-E6FB6C85BB83} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4656 mspaint.exe 4656 mspaint.exe 2564 mspaint.exe 2564 mspaint.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 3304 wmplayer.exe Token: SeCreatePagefilePrivilege 3304 wmplayer.exe Token: SeShutdownPrivilege 1352 unregmp2.exe Token: SeCreatePagefilePrivilege 1352 unregmp2.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3304 wmplayer.exe 4868 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4656 mspaint.exe 4656 mspaint.exe 4656 mspaint.exe 4656 mspaint.exe 4868 iexplore.exe 4868 iexplore.exe 4956 IEXPLORE.EXE 4956 IEXPLORE.EXE 2564 mspaint.exe 2564 mspaint.exe 2564 mspaint.exe 2564 mspaint.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3052 wrote to memory of 572 3052 605a7e9ff88673d278fe5146464280ac7a9601b48ab71bc816f5db3c0ba86609.exe 83 PID 3052 wrote to memory of 572 3052 605a7e9ff88673d278fe5146464280ac7a9601b48ab71bc816f5db3c0ba86609.exe 83 PID 3052 wrote to memory of 572 3052 605a7e9ff88673d278fe5146464280ac7a9601b48ab71bc816f5db3c0ba86609.exe 83 PID 3304 wrote to memory of 3184 3304 wmplayer.exe 104 PID 3304 wrote to memory of 3184 3304 wmplayer.exe 104 PID 3304 wrote to memory of 3184 3304 wmplayer.exe 104 PID 3184 wrote to memory of 1352 3184 unregmp2.exe 105 PID 3184 wrote to memory of 1352 3184 unregmp2.exe 105 PID 4868 wrote to memory of 4956 4868 iexplore.exe 118 PID 4868 wrote to memory of 4956 4868 iexplore.exe 118 PID 4868 wrote to memory of 4956 4868 iexplore.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\605a7e9ff88673d278fe5146464280ac7a9601b48ab71bc816f5db3c0ba86609.exe"C:\Users\Admin\AppData\Local\Temp\605a7e9ff88673d278fe5146464280ac7a9601b48ab71bc816f5db3c0ba86609.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:572
-
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\RevokeBackup.wmf"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4656
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:568
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:1352
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3304 -s 28922⤵
- Program crash
PID:2516
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:4872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3304 -ip 33041⤵PID:1624
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\ResumeExport.gif1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4868 CREDAT:17410 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4956
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4212
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Downloads\PingInvoke.rle"1⤵
- Drops file in Windows directory
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2564
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5563088ad0f20fabf9dd62c6ba8ae1636
SHA1f9cd2fd153afa1a12ff990cf27c32b8c9c44e878
SHA256eb897bf202d32f067728f1b666eb16e9926557efa8676b72db11411013030184
SHA5128229dfb1d96b6a34b91b1e5c463833e7859331be880f585c48af1ba0ace0465ac755c7f22a9e6f30284266165f850e8f85af76157eea8136b2d6f79db02d3092
-
Filesize
1024KB
MD5da08b94b2762b37d3c23f3833334aa3d
SHA13b0a81a3a5713d271161f8d2189eab32ced36f4d
SHA256d242dce741c571fa915bef1c590cab06a581e9e71609cfc7ac38835a2f87f175
SHA5128f3e54ccbe18a409bb366474128db937db708d9dff6423aa29a855becd562b2c0d2da7372300922d0efe214af11e2dca60f5cfb1feddb9efe8cc78e49c575418
-
Filesize
68KB
MD5d507778dee5295447139134680967c55
SHA19d25e360add80b3220a7399e7b557ca6bd7d8914
SHA2561704539c464d85198c2d6844e8a2e15cffe2e2294dce8658c9a30bd7466de872
SHA512f81e5957f9d84de3f54dec300973e48acb9f177f76aafabc3ed526f2b34350ff59daf84555f35122e5bf16c93c53ff71123084ffdaf8ef68c7a3b089e1b0c0d5
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD55433eab10c6b5c6d55b7cbd302426a39
SHA1c5b1604b3350dab290d081eecd5389a895c58de5
SHA25623dbf7014e99e93af5f2760f18ee1370274f06a453145c8d539b66d798dad131
SHA512207b40d6bec65ab147f963a5f42263ae5bf39857987b439a4fa1647bf9b40e99cdc43ff68b7e2463aa9a948284126ac3c9c7af8350c91134b36d8b1a9c61fd34
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD571ece5b1c8bcb9bf627a4dc620b8233c
SHA1a440e838fcdaa3843ec6deb6565359e714981adc
SHA2564a91dc7389e9ab5f28dbc1d1967c00f81e9504db70c2bbfc3bf2d53f5a5992c5
SHA5121993f4659d345bbe64edaa3d91c0c2bbc5b39746374e58b2aaa8fd9975ac43903a387adce1e08bb7aea113d7d773ebf534ba26a1f6d5ffbf86c5e4cf1aca2fdc
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms
Filesize1KB
MD5be123df3a7c2a4ae3ea0f23ea4e7a3d3
SHA1fd136d680eff42ad2583ff2f078fdcd222ad3cb3
SHA256a4ffd2765f94fcdcd248c0657fe1f0d73c74a9cba47fbe749da894da9aa6b2f6
SHA512d2125f7b9fbc2d0dbf8ca039eeb8fd09027b96b148ae5073f2330f5d5e824234ae1f8800b8b4c418af17792235f60b81760520d6a06d0e4847e1d8903117cb35
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms
Filesize3KB
MD503e2668a4da16a7d25574b3d893e7ad4
SHA156856c8a6f243c58b52691d343f21043afcf320c
SHA25647c1b477bfec2447c519533ac884ffd8a287b6e34188ca3bfae820fa7b6273a4
SHA512c63cdc22873d1cc2fa1c55778b4182ef66ab217679f2de7780a3f4897140f63a5f4d867c12ff86288ccf1af05c2c5871467d5c96ab78adf7320c2a3ee132ee21
-
Filesize
7KB
MD55e5ebadc892ae0429e75af1c83c812ae
SHA164ec4826e8acdb3bec79cb53c5b76aca967912d5
SHA256e0a884c77a3dc6508e286d4d5e4bfdc849be896ad02b709fa3f6b5b0793de787
SHA51275357487a5449bf44b548ebc256ced5b6f6d032b4c916983349bce6a7a6b3420dfe3bd7a02307bab8d9f78ddcfb58c9205857704d65894546ee17fe65cc668da
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2