Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/01/2025, 11:07
Behavioral task
behavioral1
Sample
4d986768ffa8b4a2a947cafc40ef8132ef85e2587507a84c6a309432c9d035cfN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4d986768ffa8b4a2a947cafc40ef8132ef85e2587507a84c6a309432c9d035cfN.exe
Resource
win10v2004-20241007-en
General
-
Target
4d986768ffa8b4a2a947cafc40ef8132ef85e2587507a84c6a309432c9d035cfN.exe
-
Size
29KB
-
MD5
a7f57d7f6453030e5ddcd92b5887cc60
-
SHA1
960e29d51329b7471001cbba7a4d52538f854a7a
-
SHA256
4d986768ffa8b4a2a947cafc40ef8132ef85e2587507a84c6a309432c9d035cf
-
SHA512
ee18ec962f646f4028085a5fc9934222c65dec6dabe73f549f365e4e7c9042fd47fff848a5392151f8ed6a4cfb1cd1bab174ec53884d3730bf44d8c705fcffbf
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/d+:AEwVs+0jNDY1qi/qo
Malware Config
Signatures
-
Detects MyDoom family 6 IoCs
resource yara_rule behavioral2/memory/3936-13-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/3936-37-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/3936-39-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/3936-133-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/3936-147-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/3936-154-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom -
Mydoom family
-
Executes dropped EXE 1 IoCs
pid Process 1496 services.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 4d986768ffa8b4a2a947cafc40ef8132ef85e2587507a84c6a309432c9d035cfN.exe -
resource yara_rule behavioral2/memory/3936-0-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/files/0x0007000000023c9b-4.dat upx behavioral2/memory/1496-5-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3936-13-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/1496-15-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1496-16-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1496-21-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1496-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1496-28-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1496-33-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3936-37-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/1496-38-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3936-39-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/1496-40-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/files/0x000d000000021a70-50.dat upx behavioral2/memory/3936-133-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/1496-134-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3936-147-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/1496-148-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1496-150-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3936-154-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/1496-155-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\java.exe 4d986768ffa8b4a2a947cafc40ef8132ef85e2587507a84c6a309432c9d035cfN.exe File created C:\Windows\java.exe 4d986768ffa8b4a2a947cafc40ef8132ef85e2587507a84c6a309432c9d035cfN.exe File created C:\Windows\services.exe 4d986768ffa8b4a2a947cafc40ef8132ef85e2587507a84c6a309432c9d035cfN.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4d986768ffa8b4a2a947cafc40ef8132ef85e2587507a84c6a309432c9d035cfN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3936 wrote to memory of 1496 3936 4d986768ffa8b4a2a947cafc40ef8132ef85e2587507a84c6a309432c9d035cfN.exe 83 PID 3936 wrote to memory of 1496 3936 4d986768ffa8b4a2a947cafc40ef8132ef85e2587507a84c6a309432c9d035cfN.exe 83 PID 3936 wrote to memory of 1496 3936 4d986768ffa8b4a2a947cafc40ef8132ef85e2587507a84c6a309432c9d035cfN.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d986768ffa8b4a2a947cafc40ef8132ef85e2587507a84c6a309432c9d035cfN.exe"C:\Users\Admin\AppData\Local\Temp\4d986768ffa8b4a2a947cafc40ef8132ef85e2587507a84c6a309432c9d035cfN.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
29KB
MD5ee6130d8791fb521d3c61c67c75eff60
SHA157df7358bca950ecbd04d9313795306dbf97bb06
SHA256874935a276cd67f33f867c48763d8d9565a4c9bd710dd5928589bb2615f77e74
SHA5127fea6f94cf7471d0c2a91820f6111781a2c9820e0f7a849a7d8ffc86bec67be74a76b0246bc1f7b963c8a18459e6beff1fe2841c201a9a055872796c97bb43b4
-
Filesize
352B
MD5c081d1645dd8119595f50a9712078e3e
SHA186bc75bad2b63933cbebc3b472bbd4eab9f9c124
SHA2564e7e5eb583f6c1933cb2429554e398bb8d3b9860f33ba58c267634e866985f43
SHA51295eaff215c340acbc1b2a9203bf28c62bc0209533518cc73071ea4ef8ee2190e63a76f2bf666477bedc77062f1fa476b2546b90c1978f80eb5b60aa3f8720b9b
-
Filesize
352B
MD5dffc56dd8b3d3cc9342e3504a8bef871
SHA163a5cd6826b088a3174827ef5aff51659a3978fe
SHA2563fe8d7a923d210189172562e92f644a1ac304111dcfaa20ea26c420fdd678a26
SHA51299599905456f975171a69bee8708ddc90b296c42905010ec1ace14266a6ca735e58bfd6333f22c3c4fb8942e3ec4d59b9c3840a442b3d1e00bc071866830128c
-
Filesize
352B
MD54c0a14dd37d83acc8dc9c9e6b3b5a734
SHA1e4bb1fa27eecc4360e81259753de8bcaf622eec7
SHA256ff7da6b7103a3f1922da230faa91a3feb6010bb7b1445c903fb85d478fa3295d
SHA5121785e65eb99520c20fd5066f205fc53fc058f42b5674638c9a31cb3cd5dd9aa17a2b5524ac9e0f611802d6882104e0138dbe75f32050ed175c4dbc0d3ade2e72
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2