Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2024 01:32

General

  • Target

    08442fc402944ef646d818ae4188cadc_JaffaCakes118.exe

  • Size

    26KB

  • MD5

    08442fc402944ef646d818ae4188cadc

  • SHA1

    0c106972156e3eaa50335575b9d78439f550e05d

  • SHA256

    635f4c140df76ee835230c3ff15f388ebe947e9402849f2ec1c4c9a612946571

  • SHA512

    9ebcb50a6fab16fab597313d3762d8d484b669334f32c5bd7daf870aeabec442e068703bba1dd34d1acf0a99b8f686a357f4ba5f602748d8d4016b2ba21e2b84

  • SSDEEP

    384:FZcpzCIqdG3A3WUkx38GZDJuJbf1+o44u8gHzUuKJkVbUrSKw/bRTOXGNnpfc:SCIqdH/k1ZVcT194jp4VkK+9bcX4pfc

Malware Config

Signatures

  • Detects MyDoom family 10 IoCs
  • MyDoom

    MyDoom is a Worm that is written in C++.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • UPX packed file 12 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\08442fc402944ef646d818ae4188cadc_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\08442fc402944ef646d818ae4188cadc_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:2444

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\index.exe

    Filesize

    26KB

    MD5

    08442fc402944ef646d818ae4188cadc

    SHA1

    0c106972156e3eaa50335575b9d78439f550e05d

    SHA256

    635f4c140df76ee835230c3ff15f388ebe947e9402849f2ec1c4c9a612946571

    SHA512

    9ebcb50a6fab16fab597313d3762d8d484b669334f32c5bd7daf870aeabec442e068703bba1dd34d1acf0a99b8f686a357f4ba5f602748d8d4016b2ba21e2b84

  • memory/2444-0-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB

  • memory/2444-3-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB

  • memory/2444-5-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB

  • memory/2444-7-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB

  • memory/2444-9-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB

  • memory/2444-89-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB

  • memory/2444-117-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB

  • memory/2444-118-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB

  • memory/2444-151-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB

  • memory/2444-153-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB

  • memory/2444-155-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB