Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 17:28
Behavioral task
behavioral1
Sample
37c9312a75ef93ab05d3d8ed59d4906e876dc57bccac52b065f4f297df28b21b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
37c9312a75ef93ab05d3d8ed59d4906e876dc57bccac52b065f4f297df28b21b.exe
Resource
win10v2004-20250314-en
General
-
Target
37c9312a75ef93ab05d3d8ed59d4906e876dc57bccac52b065f4f297df28b21b.exe
-
Size
23KB
-
MD5
5fbbb1aedabb81dc6c360985266ca192
-
SHA1
48c86665be1d8389e245cda2afa986d8253157d5
-
SHA256
37c9312a75ef93ab05d3d8ed59d4906e876dc57bccac52b065f4f297df28b21b
-
SHA512
e4b882c0b1f76fc8b732900f88141f1ae841f44a4092f5fe0678afab782f0851da18e5fd93c9c59c03934a3651723852d18ccb90540cc01e0a10cc5cb46c34d5
-
SSDEEP
384:FZcpzCIqdG3A3WUkx38GZDJuJbf1+o44u8gHzUp7A5KkN:SCIqdH/k1ZVcT194jp4pkZN
Malware Config
Signatures
-
Detects MyDoom family 19 IoCs
resource yara_rule behavioral2/memory/1204-9-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/3924-86-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/3068-87-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/3068-139-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/3924-161-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/3068-162-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/3068-256-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/3924-329-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/3068-330-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/3924-333-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/3068-334-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/3068-338-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/3924-339-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/3068-340-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/3924-343-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/3924-400-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/3068-401-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/3924-469-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/3924-471-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom -
Mydoom family
-
Executes dropped EXE 2 IoCs
pid Process 3068 lsass.exe 1204 lsass.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Traybar = "C:\\Windows\\lsass.exe" 37c9312a75ef93ab05d3d8ed59d4906e876dc57bccac52b065f4f297df28b21b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Traybar = "C:\\Windows\\lsass.exe" lsass.exe -
resource yara_rule behavioral2/memory/3924-0-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/files/0x0025000000023c67-4.dat upx behavioral2/memory/1204-9-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/3924-86-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/3068-87-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/3068-139-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/3924-161-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/3068-162-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/3068-256-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/3924-329-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/3068-330-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/3924-333-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/3068-334-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/3068-338-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/3924-339-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/3068-340-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/3924-343-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/3924-400-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/3068-401-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/3924-469-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/3924-471-0x0000000000800000-0x000000000080D000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\JOURNAL\Winamp 5.0 (en) Crack.exe lsass.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\Winamp 5.0 (en) Crack.exe 37c9312a75ef93ab05d3d8ed59d4906e876dc57bccac52b065f4f297df28b21b.exe File created C:\Program Files\Common Files\microsoft shared\ink\de-DE\Kazaa Lite.exe lsass.exe File created C:\Program Files\Common Files\microsoft shared\ink\index.com 37c9312a75ef93ab05d3d8ed59d4906e876dc57bccac52b065f4f297df28b21b.exe File created C:\Program Files\Common Files\microsoft shared\ink\de-DE\ICQ 4 Lite.exe 37c9312a75ef93ab05d3d8ed59d4906e876dc57bccac52b065f4f297df28b21b.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknumpad\ICQ 4 Lite.ShareReactor.com 37c9312a75ef93ab05d3d8ed59d4906e876dc57bccac52b065f4f297df28b21b.exe File created C:\Program Files\Common Files\microsoft shared\ink\th-TH\Harry Potter.com 37c9312a75ef93ab05d3d8ed59d4906e876dc57bccac52b065f4f297df28b21b.exe File created C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\Winamp 5.0 (en) Crack.exe 37c9312a75ef93ab05d3d8ed59d4906e876dc57bccac52b065f4f297df28b21b.exe File created C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\Winamp 5.0 (en) Crack.com 37c9312a75ef93ab05d3d8ed59d4906e876dc57bccac52b065f4f297df28b21b.exe File created C:\Program Files\Common Files\microsoft shared\Source Engine\Winamp 5.0 (en).exe 37c9312a75ef93ab05d3d8ed59d4906e876dc57bccac52b065f4f297df28b21b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\WinRAR.v.3.2.and.key.com lsass.exe File created C:\Program Files\Common Files\microsoft shared\ink\fr-CA\Winamp 5.0 (en) Crack.ShareReactor.com lsass.exe File created C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\Winamp 5.0 (en).com lsass.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\zh-Hant\index.com lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\EQUATION\Winamp 5.0 (en) Crack.com lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\CONCRETE\WinRAR.v.3.2.and.key.com lsass.exe File created C:\Program Files\Common Files\microsoft shared\ink\HWRCustomization\index.ShareReactor.com 37c9312a75ef93ab05d3d8ed59d4906e876dc57bccac52b065f4f297df28b21b.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ja\Harry Potter.exe 37c9312a75ef93ab05d3d8ed59d4906e876dc57bccac52b065f4f297df28b21b.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\index.exe lsass.exe File created C:\Program Files\Common Files\microsoft shared\ink\ru-RU\Kazaa Lite.exe lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\DataModel\Kazaa Lite.com lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\DataModel\Cartridges\Winamp 5.0 (en) Crack.exe lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\Cultures\Winamp 5.0 (en).ShareReactor.com lsass.exe File created C:\Program Files\Microsoft Office\Updates\Download\PackageFiles\6CFC6F6F-1CA5-4665-98E9-F0F1C9939DE7\root\vfs\Windows\Winamp 5.0 (en).ShareReactor.com lsass.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\Winamp 5.0 (en) Crack.exe 37c9312a75ef93ab05d3d8ed59d4906e876dc57bccac52b065f4f297df28b21b.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\fr\WinRAR.v.3.2.and.key.com 37c9312a75ef93ab05d3d8ed59d4906e876dc57bccac52b065f4f297df28b21b.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\RMNSQUE\index.ShareReactor.com lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\VBA\VBA7.1\Winamp 5.0 (en).com lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\EQUATION\index.exe lsass.exe File created C:\Program Files\Common Files\microsoft shared\Kazaa Lite.ShareReactor.com 37c9312a75ef93ab05d3d8ed59d4906e876dc57bccac52b065f4f297df28b21b.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ko\ICQ 4 Lite.exe 37c9312a75ef93ab05d3d8ed59d4906e876dc57bccac52b065f4f297df28b21b.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\zh-Hant\Harry Potter.ShareReactor.com 37c9312a75ef93ab05d3d8ed59d4906e876dc57bccac52b065f4f297df28b21b.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\it\index.ShareReactor.com 37c9312a75ef93ab05d3d8ed59d4906e876dc57bccac52b065f4f297df28b21b.exe File created C:\Program Files\Common Files\microsoft shared\ink\fi-FI\Winamp 5.0 (en).ShareReactor.com lsass.exe File created C:\Program Files\Common Files\microsoft shared\Stationery\Kazaa Lite.com lsass.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hant\index.ShareReactor.com lsass.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\ICQ 4 Lite.com 37c9312a75ef93ab05d3d8ed59d4906e876dc57bccac52b065f4f297df28b21b.exe File created C:\Program Files\Common Files\microsoft shared\ink\zh-TW\ICQ 4 Lite.exe 37c9312a75ef93ab05d3d8ed59d4906e876dc57bccac52b065f4f297df28b21b.exe File created C:\Program Files\Common Files\microsoft shared\TextConv\Kazaa Lite.ShareReactor.com 37c9312a75ef93ab05d3d8ed59d4906e876dc57bccac52b065f4f297df28b21b.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\tr\ICQ 4 Lite.ShareReactor.com 37c9312a75ef93ab05d3d8ed59d4906e876dc57bccac52b065f4f297df28b21b.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ja\Winamp 5.0 (en) Crack.ShareReactor.com 37c9312a75ef93ab05d3d8ed59d4906e876dc57bccac52b065f4f297df28b21b.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\Kazaa Lite.com lsass.exe File created C:\Program Files\Common Files\microsoft shared\ink\nl-NL\index.ShareReactor.com lsass.exe File created C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\index.exe lsass.exe File created C:\Program Files\Common Files\microsoft shared\VC\Winamp 5.0 (en) Crack.ShareReactor.com lsass.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\Winamp 5.0 (en) Crack.ShareReactor.com lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\EURO\Kazaa Lite.com lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\Cultures\Kazaa Lite.exe lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\SKY\Winamp 5.0 (en).exe lsass.exe File created C:\Program Files\Common Files\microsoft shared\MSInfo\index.exe lsass.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\Kazaa Lite.com lsass.exe File created C:\Program Files\Common Files\microsoft shared\ink\lv-LV\Harry Potter.exe 37c9312a75ef93ab05d3d8ed59d4906e876dc57bccac52b065f4f297df28b21b.exe File created C:\Program Files\Common Files\microsoft shared\ink\pl-PL\Winamp 5.0 (en) Crack.ShareReactor.com 37c9312a75ef93ab05d3d8ed59d4906e876dc57bccac52b065f4f297df28b21b.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\de\WinRAR.v.3.2.and.key.com 37c9312a75ef93ab05d3d8ed59d4906e876dc57bccac52b065f4f297df28b21b.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\fr\index.exe 37c9312a75ef93ab05d3d8ed59d4906e876dc57bccac52b065f4f297df28b21b.exe File created C:\Program Files\Common Files\microsoft shared\WinRAR.v.3.2.and.key.com lsass.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\ICQ 4 Lite.exe lsass.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ru\Harry Potter.ShareReactor.com lsass.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\cs\Winamp 5.0 (en) Crack.ShareReactor.com lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Smart Tag\1033\Winamp 5.0 (en).ShareReactor.com lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\SONORA\index.ShareReactor.com lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\TRANSLAT\ENES\Harry Potter.exe lsass.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\pt-BR\ICQ 4 Lite.exe 37c9312a75ef93ab05d3d8ed59d4906e876dc57bccac52b065f4f297df28b21b.exe File created C:\Program Files\Common Files\microsoft shared\ink\HWRCustomization\Winamp 5.0 (en).exe lsass.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\lsass.exe 37c9312a75ef93ab05d3d8ed59d4906e876dc57bccac52b065f4f297df28b21b.exe File created C:\Windows\lsass.exe 37c9312a75ef93ab05d3d8ed59d4906e876dc57bccac52b065f4f297df28b21b.exe File opened for modification C:\Windows\lsass.exe lsass.exe File created C:\Windows\lsass.exe lsass.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 37c9312a75ef93ab05d3d8ed59d4906e876dc57bccac52b065f4f297df28b21b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5024 wrote to memory of 3068 5024 cmd.exe 88 PID 5024 wrote to memory of 3068 5024 cmd.exe 88 PID 5024 wrote to memory of 3068 5024 cmd.exe 88 PID 4340 wrote to memory of 1204 4340 cmd.exe 91 PID 4340 wrote to memory of 1204 4340 cmd.exe 91 PID 4340 wrote to memory of 1204 4340 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\37c9312a75ef93ab05d3d8ed59d4906e876dc57bccac52b065f4f297df28b21b.exe"C:\Users\Admin\AppData\Local\Temp\37c9312a75ef93ab05d3d8ed59d4906e876dc57bccac52b065f4f297df28b21b.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3924
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\lsass.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\lsass.exeC:\Windows\lsass.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3068
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\lsass.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Windows\lsass.exeC:\Windows\lsass.exe2⤵
- Executes dropped EXE
PID:1204
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5085159aede86e06bfb0edf46fdcc74e4
SHA1b6921fa93c53217f03f00bcf63f52954eee1971c
SHA25698a7a29a34bcefa9d0f8bd255bbe34585d0cdc4c5d79ece88f5c9bf6e901549b
SHA5120a63220fd66cae044a0074d592ab3c83c95e330733ebc0c4b0c4ec0f5eda25fba7102690700e94f4b08050dd80d1f5d10ab4595acb2a47cae781b386ce4c3019
-
Filesize
23KB
MD55fbbb1aedabb81dc6c360985266ca192
SHA148c86665be1d8389e245cda2afa986d8253157d5
SHA25637c9312a75ef93ab05d3d8ed59d4906e876dc57bccac52b065f4f297df28b21b
SHA512e4b882c0b1f76fc8b732900f88141f1ae841f44a4092f5fe0678afab782f0851da18e5fd93c9c59c03934a3651723852d18ccb90540cc01e0a10cc5cb46c34d5