Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/03/2025, 17:09

General

  • Target

    Email-Worm.MyDoom.Q.exe

  • Size

    69KB

  • MD5

    90ed312f62273faf905bb1c84b373148

  • SHA1

    e1e61ff9ee752bab865cdbcc60b984ef5dbf0f93

  • SHA256

    a1bede9e51a9bd3595c079d505a96816de8575b6a87425b42325ed1b7598390d

  • SHA512

    b832ac68b700afefee267ca491b639a11841f22a7c81fbac5e36a07bbedcbb117738d66ae96215708bba8524521b11e0751b967acc18018eedcc5de6fb1a9c69

  • SSDEEP

    1536:/g7wc1aGNC0klI7CPN3uxP9YhzQ7p1whO3ylqva1WX+:I7wc1aOCo7C132PwG+O3yYxu

Malware Config

Signatures

  • Detects MyDoom family 5 IoCs
  • MyDoom

    MyDoom is a Worm that is written in C++.

  • Mydoom family
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Email-Worm.MyDoom.Q.exe
    "C:\Users\Admin\AppData\Local\Temp\Email-Worm.MyDoom.Q.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:5060
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c C:\Windows\lsass.exe
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\Windows\lsass.exe
      C:\Windows\lsass.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:924
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c C:\Windows\lsass.exe
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:460
    • C:\Windows\lsass.exe
      C:\Windows\lsass.exe
      2⤵
      • Executes dropped EXE
      PID:3508

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\UMKxljupixn.txt

    Filesize

    36KB

    MD5

    2a924241bad6b13b10465e5771323dd2

    SHA1

    12ca755b306adeca74033da2487e0dab9a1f0cf6

    SHA256

    968ae1e2b61642a8c7de7a7ca69583b7d41e705ff826a6c2c734e70a9001d8b8

    SHA512

    55dd77744eb31de8352dbad52870e6a6fe71ece33968f30f1406ad3da479f00156c47d063436c31d9ba84733d6d2ce500558fecb9111ff705078b602854fc48b

  • C:\Windows\lsass.exe

    Filesize

    69KB

    MD5

    90ed312f62273faf905bb1c84b373148

    SHA1

    e1e61ff9ee752bab865cdbcc60b984ef5dbf0f93

    SHA256

    a1bede9e51a9bd3595c079d505a96816de8575b6a87425b42325ed1b7598390d

    SHA512

    b832ac68b700afefee267ca491b639a11841f22a7c81fbac5e36a07bbedcbb117738d66ae96215708bba8524521b11e0751b967acc18018eedcc5de6fb1a9c69

  • memory/924-447-0x0000000000800000-0x000000000080A000-memory.dmp

    Filesize

    40KB

  • memory/3508-9-0x0000000000800000-0x000000000080A000-memory.dmp

    Filesize

    40KB

  • memory/5060-0-0x0000000000800000-0x000000000080A000-memory.dmp

    Filesize

    40KB

  • memory/5060-439-0x0000000000800000-0x000000000080A000-memory.dmp

    Filesize

    40KB