Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2024, 07:30

General

  • Target

    0e9647465e11ffe7dd1188b6c43f544e_JaffaCakes118.exe

  • Size

    28KB

  • MD5

    0e9647465e11ffe7dd1188b6c43f544e

  • SHA1

    39ddfb05e08bff3cb336b5050f083ac61eab17dd

  • SHA256

    aa920fbb702a57c51edbbf9d9776cbb4a051771a51ff7675cc303779aa65535d

  • SHA512

    5d9709f6fd64845638a6c6cdbe7c4f365aecf2dab2a612cab237f31c6f9628d643cfd4f2ca7c2a8335b1ccb1479a89e1cb69425f1482780a99b572acf6e8a8a5

  • SSDEEP

    384:1vxBbK26lj5Id8SpHx9jLhsznnVxA1WmP5w7GGCJlqqwMyNkgy5Ln:Dv8IRRdsxq1DjJcqfmy5T

Malware Config

Signatures

  • Detects MyDoom family 5 IoCs
  • MyDoom

    MyDoom is a Worm that is written in C++.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • UPX packed file 24 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e9647465e11ffe7dd1188b6c43f544e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0e9647465e11ffe7dd1188b6c43f544e_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1616
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:3144

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\GENTSNHI\search[2].htm

    Filesize

    25B

    MD5

    8ba61a16b71609a08bfa35bc213fce49

    SHA1

    8374dddcc6b2ede14b0ea00a5870a11b57ced33f

    SHA256

    6aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1

    SHA512

    5855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1

  • C:\Users\Admin\AppData\Local\Temp\tmp1C3B.tmp

    Filesize

    28KB

    MD5

    fad169b14c98b95fe6ebc82ad0542755

    SHA1

    f2623ef3d18cc1255851acfd284ea5dbfe3996e6

    SHA256

    c790e55fb5fdc247cb8de2e2c9ca8bf9e08196b9bbf0acb8122e9d53166fa3d1

    SHA512

    07dcaa0c4cd5b55b7d3c68c26ef17265c7e9a829872a87f1ddd91bd5b684c70d8ac5ec2dce3fb7493dda1572c4386f70bb9f2e7e804df587928bfd5e4064bfb2

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    1KB

    MD5

    1810247603c4b6cc40546ca1194086ea

    SHA1

    4a3081add7d03caa7552c7c156e110e162030b5c

    SHA256

    add1f974fcfb0b640fc131d44093ee2c2742ddaa4fe8e5457be8d1bbd8e83f0b

    SHA512

    90fd10124d0e07d3177fa18d97e5f40c125633758f2f2ac5af6889e52f32be8c7b22623ee471cbf9c646e7bb2f3a4eebaec39a23b97e7f4ca7468c4da6d71a09

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    1KB

    MD5

    148515baec5921432e77327d243f925e

    SHA1

    80c3ba32394b500b98950debd4549c5d67db7bf5

    SHA256

    c0e304adfa61cde1010fb171200c6c4e7040a896c08be372080f0612550a346a

    SHA512

    56cbfddbf795f4964ad614517660bd5724dfbe7db5f7966bf93420de3f731d8a96b7ff5f8dc83d9e83259feafe39fdb82ad2666ad1c5a612c895624268c89064

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/1616-51-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1616-168-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1616-13-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1616-146-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1616-0-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1616-56-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/3144-21-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3144-33-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3144-50-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3144-40-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3144-52-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3144-38-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3144-57-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3144-45-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3144-28-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3144-26-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3144-16-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3144-149-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3144-15-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3144-5-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3144-169-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3144-173-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB