Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 17:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e284fb13e4db1b94c801abae6050d6dc_JaffaCakes118.exe
Resource
win7-20241023-en
windows7-x64
6 signatures
150 seconds
General
-
Target
e284fb13e4db1b94c801abae6050d6dc_JaffaCakes118.exe
-
Size
67KB
-
MD5
e284fb13e4db1b94c801abae6050d6dc
-
SHA1
02fc9f55d052eca0fb8ed94b6543ab96a53480ab
-
SHA256
c11f7d228348539fbd2040bd0a83177f2971bdf306578d2796c0eb1333b396e2
-
SHA512
ca48c8c03d1440e1a8a15de2af2fac9c0598f3e444ec878fc9be0be599403df9e07d02beacf07149ac4936e1a1f881f2950f251781a744a4e9005cb40dfcfe7b
-
SSDEEP
1536:LBj4lXVB1WRydFMQaKBZRS30tJK4owAFmPE3TGBt3g4Oo+:LB8ZPHOmP4Et3gL
Malware Config
Signatures
-
Detects MyDoom family 2 IoCs
resource yara_rule behavioral1/memory/2132-4-0x00000000004A0000-0x00000000004AD000-memory.dmp family_mydoom behavioral1/memory/2132-2-0x00000000004A0000-0x00000000004AD000-memory.dmp family_mydoom -
Mydoom family
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2100 set thread context of 2132 2100 e284fb13e4db1b94c801abae6050d6dc_JaffaCakes118.exe 30 PID 2100 set thread context of 2436 2100 e284fb13e4db1b94c801abae6050d6dc_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e284fb13e4db1b94c801abae6050d6dc_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2132 2100 e284fb13e4db1b94c801abae6050d6dc_JaffaCakes118.exe 30 PID 2100 wrote to memory of 2132 2100 e284fb13e4db1b94c801abae6050d6dc_JaffaCakes118.exe 30 PID 2100 wrote to memory of 2132 2100 e284fb13e4db1b94c801abae6050d6dc_JaffaCakes118.exe 30 PID 2100 wrote to memory of 2132 2100 e284fb13e4db1b94c801abae6050d6dc_JaffaCakes118.exe 30 PID 2100 wrote to memory of 2132 2100 e284fb13e4db1b94c801abae6050d6dc_JaffaCakes118.exe 30 PID 2100 wrote to memory of 2132 2100 e284fb13e4db1b94c801abae6050d6dc_JaffaCakes118.exe 30 PID 2100 wrote to memory of 2132 2100 e284fb13e4db1b94c801abae6050d6dc_JaffaCakes118.exe 30 PID 2100 wrote to memory of 2132 2100 e284fb13e4db1b94c801abae6050d6dc_JaffaCakes118.exe 30 PID 2100 wrote to memory of 2436 2100 e284fb13e4db1b94c801abae6050d6dc_JaffaCakes118.exe 31 PID 2100 wrote to memory of 2436 2100 e284fb13e4db1b94c801abae6050d6dc_JaffaCakes118.exe 31 PID 2100 wrote to memory of 2436 2100 e284fb13e4db1b94c801abae6050d6dc_JaffaCakes118.exe 31 PID 2100 wrote to memory of 2436 2100 e284fb13e4db1b94c801abae6050d6dc_JaffaCakes118.exe 31 PID 2100 wrote to memory of 2436 2100 e284fb13e4db1b94c801abae6050d6dc_JaffaCakes118.exe 31 PID 2100 wrote to memory of 2436 2100 e284fb13e4db1b94c801abae6050d6dc_JaffaCakes118.exe 31 PID 2100 wrote to memory of 2436 2100 e284fb13e4db1b94c801abae6050d6dc_JaffaCakes118.exe 31 PID 2100 wrote to memory of 2436 2100 e284fb13e4db1b94c801abae6050d6dc_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\e284fb13e4db1b94c801abae6050d6dc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e284fb13e4db1b94c801abae6050d6dc_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\e284fb13e4db1b94c801abae6050d6dc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e284fb13e4db1b94c801abae6050d6dc_JaffaCakes118.exe"2⤵PID:2132
-
-
C:\Users\Admin\AppData\Local\Temp\e284fb13e4db1b94c801abae6050d6dc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e284fb13e4db1b94c801abae6050d6dc_JaffaCakes118.exe"2⤵PID:2436
-