Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/10/2024, 11:27

General

  • Target

    177f6911ac22f1435b22885adca1f900_JaffaCakes118.exe

  • Size

    48KB

  • MD5

    177f6911ac22f1435b22885adca1f900

  • SHA1

    8b9f5680542e31791e1c7b7daf897b3efefd916c

  • SHA256

    a667b020f1f99647e06a23ce875085cb9caefec3705a6c634d892919742d7f5b

  • SHA512

    f868f408d61014ad260eaf9079fc300f039433eb08d12fe3389cb57ae8224e701b1bc6794330ec6063a87a5355d628ed96a36f56ba987456c50eb00df303268c

  • SSDEEP

    768:jv8IRRdsxq1DjJcqOVBLUvTd2wmDkuBgs5vY2HJvqRTkoCmq1UrHL5Zr:DxRTsxq1DjCBBLUrGaeva1CmRrHb

Malware Config

Signatures

  • Detects MyDoom family 6 IoCs
  • MyDoom

    MyDoom is a Worm that is written in C++.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • UPX packed file 25 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 12 IoCs
  • Drops file in Windows directory 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\177f6911ac22f1435b22885adca1f900_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\177f6911ac22f1435b22885adca1f900_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4540
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:408
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4128,i,16316361669272684588,6171287487746154806,262144 --variations-seed-version --mojo-platform-channel-handle=4076 /prefetch:8
    1⤵
    • Executes dropped EXE
    PID:3844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

    Filesize

    3.6MB

    MD5

    3640aac842e24c750d5a3fc4b5681b64

    SHA1

    b5daa0e1faeb7836b4d988186ee3e2188699552a

    SHA256

    0d5bb995aa25eb3efcc1bd548e54b959ef96469cbea1e4e77b042d972ca347fe

    SHA512

    e019302bf0dd0137a162f2dfa2fc230cf5f5e65dea3d030a1199626ae34d537e260db2defb9c465dc84389013267fd33749de4b0f1ac9e1520a8e2702fc04c34

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\XHVIU6BA\search[2].htm

    Filesize

    25B

    MD5

    8ba61a16b71609a08bfa35bc213fce49

    SHA1

    8374dddcc6b2ede14b0ea00a5870a11b57ced33f

    SHA256

    6aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1

    SHA512

    5855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1

  • C:\Users\Admin\AppData\Local\Temp\tmpF052.tmp

    Filesize

    48KB

    MD5

    fc07f87bad6d976c8422906cfa845385

    SHA1

    e775365790ad2fbf6a114c2274e42b893d6f33d2

    SHA256

    685d77273d4bf29a9ce94f43452e1b373fdeb92ff1c5b1313e2ccf327b21dea1

    SHA512

    e7899b03ad13d3bd3d801a732cb676cfaf72984ece9ff0eef8d02c3adbcee8c1845186074e7c2b49275ff79781fd90e4b295f78e8f10406ff78311320407a599

  • C:\Users\Admin\AppData\Local\Temp\xavnwvdnrf.log

    Filesize

    1KB

    MD5

    2278fa9943a4384047629c8352c15ef6

    SHA1

    a2f4381f937ee204d6d84d876ef892a6fb0b8a83

    SHA256

    d8e32f46484336bf4735636029bea61c7b077c6b827c4d1b2d5fadfdbd1372ce

    SHA512

    4dbfc42bfbfedae9f618f1a00544b26143bd54b7ad981a2b5804105b048cfd43e2bb71d0921180fcbb2db786aeb6110bfa8323edf653389ff2602e0ee4d5ae1c

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    1KB

    MD5

    2e34e70beda41a4374ebb7055f025ae2

    SHA1

    ffcb885a06f411d2787d068994564aae554e654d

    SHA256

    237f73ebeb62ad5669d1d259bb4ab087c16fea21bdad96beb2c18868dd9a30f7

    SHA512

    5f3b5ed58267731b528472c08d5203109aecac1fa42a2768fc4eba20ebf912b13d8b42167801739aa1af8f611369e68f9dcb29890e123783c2120b0bfd3944c5

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    1KB

    MD5

    22fbba04f482228f3bf7476141d27f08

    SHA1

    1cf868dff0a9883ab820da2aa92fd232403b2ce5

    SHA256

    782f3401b08bc6bc261775236c82f6f8e60368be677c034214294a9886ffd6af

    SHA512

    e420327c336c4d9a7ff819feb828d2ca971dbc4e4f29493b0aa4c043866b0bd7edd0fc3af5bb03556251dcf41b073d190609793425cba0ce365fdc8625fed0e9

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    1KB

    MD5

    053df5d8747d55812c41c9f4113e9554

    SHA1

    3b06df01730cba07765937295b962fceea074a10

    SHA256

    fdefdca77877e74b04af26e5a942ed18059b6e406106b47d1e224b467f93dd91

    SHA512

    0ae7ec8f908334608ddf8a16312b54b48b7150c903003d08436c956560cf48999675b90808800b0a2281e6672d92d184da60cf2bf04e393825a713c23167e942

  • C:\Windows\SysWOW64\vcmgcd32.dll

    Filesize

    36KB

    MD5

    ae22ca9f11ade8e362254b452cc07f78

    SHA1

    4b3cb548c547d3be76e571e0579a609969b05975

    SHA256

    20cbcc9d1e6bd3c7ccacbe81fd26551b2ccfc02c00e8f948b9e9016c8b401db6

    SHA512

    9e1c725758a284ec9132f393a0b27b019a7dde32dc0649b468152876b1c77b195abc9689b732144d8c5b4d0b5fcb960a3074264cab75e6681932d3da2a644bc1

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/408-66-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/408-35-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/408-42-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/408-47-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/408-53-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/408-55-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/408-192-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/408-14-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/408-187-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/408-40-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/408-61-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/408-185-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/408-68-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/408-161-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/408-26-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/408-27-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4540-7-0x0000000010000000-0x0000000010011000-memory.dmp

    Filesize

    68KB

  • memory/4540-154-0x0000000000500000-0x0000000000515000-memory.dmp

    Filesize

    84KB

  • memory/4540-65-0x0000000000500000-0x0000000000515000-memory.dmp

    Filesize

    84KB

  • memory/4540-184-0x0000000000500000-0x0000000000515000-memory.dmp

    Filesize

    84KB

  • memory/4540-67-0x0000000000500000-0x0000000000515000-memory.dmp

    Filesize

    84KB

  • memory/4540-59-0x0000000010000000-0x0000000010011000-memory.dmp

    Filesize

    68KB

  • memory/4540-191-0x0000000000500000-0x0000000000515000-memory.dmp

    Filesize

    84KB

  • memory/4540-0-0x0000000000500000-0x0000000000515000-memory.dmp

    Filesize

    84KB

  • memory/4540-21-0x0000000000500000-0x0000000000515000-memory.dmp

    Filesize

    84KB