Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2025, 14:41
Behavioral task
behavioral1
Sample
Email-Worm.MyDoom.NF.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Email-Worm.MyDoom.NF.exe
Resource
win10v2004-20250314-en
General
-
Target
Email-Worm.MyDoom.NF.exe
-
Size
44KB
-
MD5
f0a4e1b9f16bedb637748b0ae2d38b0b
-
SHA1
36a61581ee833366a2f75c900cba601a3b317105
-
SHA256
0ead89a60b4d19bfca4a7d25391acf27e21a2e921eeb45327e1e23737f89a806
-
SHA512
3754150ab510d9bf8b4f1cb98edd16616af5e0bcb777c821368573b53e2a76590568a0d9812ea4e4ccf0171e912ede3240d00b35c437b8f0696585276a3472d0
-
SSDEEP
768:SCIqdH/k1ZVcT194jp4yEP5w+814Rz6C3+SOGw8crAmvGFpUqMt:SNqaLV8a6yEPe+8KX3JM
Malware Config
Signatures
-
Detects MyDoom family 21 IoCs
resource yara_rule behavioral2/memory/4304-9-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/4164-86-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/3540-87-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/3540-139-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/4164-177-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/3540-178-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/3540-261-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/4164-299-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/3540-321-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/4164-324-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/3540-325-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/3540-329-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/4164-330-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/3540-331-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/3540-333-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/4164-406-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/4164-459-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/3540-460-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/4164-485-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/4164-556-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/3540-557-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom -
Mydoom family
-
Executes dropped EXE 2 IoCs
pid Process 3540 lsass.exe 4304 lsass.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Traybar = "C:\\Windows\\lsass.exe" Email-Worm.MyDoom.NF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Traybar = "C:\\Windows\\lsass.exe" lsass.exe -
resource yara_rule behavioral2/memory/4164-0-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/files/0x00070000000231aa-4.dat upx behavioral2/memory/4304-9-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/4164-86-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/3540-87-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/3540-139-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/4164-177-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/3540-178-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/3540-261-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/4164-299-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/3540-321-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/4164-324-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/3540-325-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/3540-329-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/4164-330-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/3540-331-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/3540-333-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/4164-406-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/4164-459-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/3540-460-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/4164-485-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/4164-556-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/3540-557-0x0000000000800000-0x000000000080D000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ja\Harry Potter.ShareReactor.com lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\Harry Potter.com lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\EDGE\Winamp 5.0 (en).com lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\VBA\WinRAR.v.3.2.and.key.ShareReactor.com lsass.exe File created C:\Program Files\Common Files\microsoft shared\Triedit\en-US\Kazaa Lite.com Email-Worm.MyDoom.NF.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\Winamp 5.0 (en).exe Email-Worm.MyDoom.NF.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\it\ICQ 4 Lite.exe Email-Worm.MyDoom.NF.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\INDUST\Winamp 5.0 (en).exe Email-Worm.MyDoom.NF.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\fr\index.ShareReactor.com lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\AFTRNOON\Kazaa Lite.exe lsass.exe File created C:\Program Files\Common Files\microsoft shared\ink\he-IL\WinRAR.v.3.2.and.key.com Email-Worm.MyDoom.NF.exe File created C:\Program Files\Common Files\microsoft shared\ink\LanguageModel\Winamp 5.0 (en) Crack.exe Email-Worm.MyDoom.NF.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\VBA\VBA7.1\1033\Winamp 5.0 (en).exe Email-Worm.MyDoom.NF.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\WinRAR.v.3.2.and.key.exe lsass.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\WinRAR.v.3.2.and.key.com Email-Worm.MyDoom.NF.exe File created C:\Program Files\Common Files\microsoft shared\ink\fr-FR\Harry Potter.com lsass.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\pt-BR\index.com lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\WinRAR.v.3.2.and.key.com lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\INDUST\ICQ 4 Lite.com lsass.exe File created C:\Program Files\Common Files\microsoft shared\ink\ro-RO\Harry Potter.com Email-Worm.MyDoom.NF.exe File created C:\Program Files\Common Files\microsoft shared\VSTO\10.0\1033\WinRAR.v.3.2.and.key.exe Email-Worm.MyDoom.NF.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\Harry Potter.com Email-Worm.MyDoom.NF.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\JOURNAL\Harry Potter.exe Email-Worm.MyDoom.NF.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\Harry Potter.ShareReactor.com lsass.exe File created C:\Program Files\Microsoft Office\Updates\Download\WinRAR.v.3.2.and.key.ShareReactor.com lsass.exe File created C:\Program Files\Common Files\microsoft shared\VC\index.exe Email-Worm.MyDoom.NF.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\CASCADE\index.exe Email-Worm.MyDoom.NF.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\REFINED\Winamp 5.0 (en).exe Email-Worm.MyDoom.NF.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\ICQ 4 Lite.ShareReactor.com lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\BOLDSTRI\WinRAR.v.3.2.and.key.ShareReactor.com lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\RICEPAPR\Winamp 5.0 (en).com lsass.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\WinRAR.v.3.2.and.key.com Email-Worm.MyDoom.NF.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\RICEPAPR\Winamp 5.0 (en).com Email-Worm.MyDoom.NF.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\TRANSLAT\Winamp 5.0 (en) Crack.com lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\TRANSLAT\ESEN\Harry Potter.ShareReactor.com lsass.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\de\Harry Potter.exe Email-Worm.MyDoom.NF.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\DEEPBLUE\Winamp 5.0 (en).ShareReactor.com Email-Worm.MyDoom.NF.exe File created C:\Program Files\Common Files\microsoft shared\ink\da-DK\Winamp 5.0 (en).com lsass.exe File created C:\Program Files\Common Files\microsoft shared\ink\he-IL\index.exe lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\Portal\WinRAR.v.3.2.and.key.ShareReactor.com lsass.exe File created C:\Program Files\Common Files\microsoft shared\ink\de-DE\ICQ 4 Lite.ShareReactor.com Email-Worm.MyDoom.NF.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\Portal\1033\Harry Potter.exe Email-Worm.MyDoom.NF.exe File created C:\Program Files\Common Files\microsoft shared\ink\de-DE\Harry Potter.ShareReactor.com lsass.exe File created C:\Program Files\Microsoft Office\Updates\Download\PackageFiles\C8AEC87C-250A-4245-AABC-2833A16D2ADF\root\vfs\Windows\ICQ 4 Lite.com lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\ARCTIC\Harry Potter.ShareReactor.com Email-Worm.MyDoom.NF.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\RMNSQUE\WinRAR.v.3.2.and.key.exe Email-Worm.MyDoom.NF.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav\WinRAR.v.3.2.and.key.ShareReactor.com lsass.exe File created C:\Program Files\Common Files\microsoft shared\ink\sv-SE\WinRAR.v.3.2.and.key.com lsass.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hans\ICQ 4 Lite.ShareReactor.com lsass.exe File created C:\Program Files\Common Files\microsoft shared\ink\hr-HR\ICQ 4 Lite.exe Email-Worm.MyDoom.NF.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\VBA\VBA7.1\1033\Winamp 5.0 (en) Crack.exe Email-Worm.MyDoom.NF.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\SATIN\Winamp 5.0 (en).exe lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Web Server Extensions\16\BIN\1033\Kazaa Lite.ShareReactor.com lsass.exe File created C:\Program Files\Common Files\microsoft shared\ink\lt-LT\WinRAR.v.3.2.and.key.ShareReactor.com Email-Worm.MyDoom.NF.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\AFTRNOON\index.com Email-Worm.MyDoom.NF.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\PROFILE\ICQ 4 Lite.exe Email-Worm.MyDoom.NF.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\STUDIO\ICQ 4 Lite.com Email-Worm.MyDoom.NF.exe File created C:\Program Files\Common Files\microsoft shared\ink\nl-NL\Winamp 5.0 (en) Crack.com lsass.exe File created C:\Program Files\Common Files\microsoft shared\OFFICE16\WinRAR.v.3.2.and.key.exe lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\GRPHFLT\Kazaa Lite.ShareReactor.com lsass.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\Kazaa Lite.com Email-Worm.MyDoom.NF.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\PROOF\Winamp 5.0 (en).com Email-Worm.MyDoom.NF.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\BLUECALM\WinRAR.v.3.2.and.key.exe Email-Worm.MyDoom.NF.exe File created C:\Program Files\Common Files\microsoft shared\ink\sl-SI\Kazaa Lite.com Email-Worm.MyDoom.NF.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\lsass.exe lsass.exe File opened for modification C:\Windows\lsass.exe Email-Worm.MyDoom.NF.exe File created C:\Windows\lsass.exe Email-Worm.MyDoom.NF.exe File opened for modification C:\Windows\lsass.exe lsass.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Email-Worm.MyDoom.NF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 452 wrote to memory of 3540 452 cmd.exe 88 PID 452 wrote to memory of 3540 452 cmd.exe 88 PID 452 wrote to memory of 3540 452 cmd.exe 88 PID 3164 wrote to memory of 4304 3164 cmd.exe 91 PID 3164 wrote to memory of 4304 3164 cmd.exe 91 PID 3164 wrote to memory of 4304 3164 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\Email-Worm.MyDoom.NF.exe"C:\Users\Admin\AppData\Local\Temp\Email-Worm.MyDoom.NF.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4164
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\lsass.exe1⤵
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\lsass.exeC:\Windows\lsass.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3540
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\lsass.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Windows\lsass.exeC:\Windows\lsass.exe2⤵
- Executes dropped EXE
PID:4304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD54e19a0c48d7681a2df2ea6fc0d0cf10f
SHA14432131406903804f6f1388304e8acfcd30be72c
SHA256aa71ae92d0405d64d3682ab41fb0533b4bf164f4c651dd967fffa2167bd8b12e
SHA5124f71f693792788112f409771a5ed5ead92c09e0083241f5328a0c589d0e238021004fafd3a8e234ca96592c94d0b5d3524b06e292bc9bdfd98f775a3f09e70aa
-
Filesize
44KB
MD5c4b8ee4c2a51a8e9c3a6a365c1060ade
SHA1b9eee3685902b8dda86343540e1e4ff01a31deb5
SHA2567bf335358914873d95331cedf53f9620e25f587fbcde04ca8158721811eb705d
SHA51209e5ef33d0096b504e9c88a1402c80d376b7c5b9da394fcf5db5cb2f7bed1d8040ecabbc5c048ca42c6fafec7e4959bfa598e74dc3923106e8bdd9f5fbe06e9e
-
Filesize
44KB
MD5f0a4e1b9f16bedb637748b0ae2d38b0b
SHA136a61581ee833366a2f75c900cba601a3b317105
SHA2560ead89a60b4d19bfca4a7d25391acf27e21a2e921eeb45327e1e23737f89a806
SHA5123754150ab510d9bf8b4f1cb98edd16616af5e0bcb777c821368573b53e2a76590568a0d9812ea4e4ccf0171e912ede3240d00b35c437b8f0696585276a3472d0