Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-12-2024 22:31

General

  • Target

    e8935d71ab624e85edcbfbaddc564ce5_JaffaCakes118.exe

  • Size

    27KB

  • MD5

    e8935d71ab624e85edcbfbaddc564ce5

  • SHA1

    c71a191dd851485687439047966fa08b710d5f4f

  • SHA256

    e338bc0a9e83cef012008e9e15cb0fda1787b04dd7410a57c283d09f9eebe96f

  • SHA512

    df98867dfdfc32734a7bf9f6c7e9d3a4afba5e1ed03a50c268b5f0cbe8baab66bede9999ff359367c13d099309a4b4163426fe93612800907ca413b7e2fd6740

  • SSDEEP

    384:1vxBbK26lj5Id8SpHx9jLhsznnVxA1WmP5w7GGCJlqqwMyN6V:Dv8IRRdsxq1DjJcqflV

Malware Config

Signatures

  • Detects MyDoom family 7 IoCs
  • MyDoom

    MyDoom is a Worm that is written in C++.

  • Mydoom family
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • UPX packed file 26 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e8935d71ab624e85edcbfbaddc564ce5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e8935d71ab624e85edcbfbaddc564ce5_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3036
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:1128

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\9IEW0KLU\ETU6G8CV.htm

    Filesize

    162KB

    MD5

    81fd403ffe3bd397c699e62b0583260e

    SHA1

    c34a50e3857ff8da01b259061ce25eef1b73705b

    SHA256

    545bfaf6ca58f5fc3fabb525d6957de6d5911b1d8b350c8fa0461871784c2180

    SHA512

    5cab590eea1c91878ddf67a654a444b280b59110c476820f7314e40e0ea2a8ac9ea3f560a8b9e75903da53bf739a9c2c4e0e070ecd59c6f10d42d3a1b5a2daac

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\L6PPXFHA\search[2].htm

    Filesize

    145KB

    MD5

    9dfe4ccd28c1695a7b4ef64b4e9fcdab

    SHA1

    10d40e931942f8d42298798ed999c584faed3643

    SHA256

    3c28d4464d139bd5b6e606cde1a8aee73095cf4cf2db542d1fa5d5a866595380

    SHA512

    966dc82362f09fb5229e8ccceb3e1b850040c96e763be942133a43dddc31f1d18fa2d85c3898582c58649037cba769185e0e5f60de14228200791d275bdcd339

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\VKYZDMA5\search[4].htm

    Filesize

    25B

    MD5

    8ba61a16b71609a08bfa35bc213fce49

    SHA1

    8374dddcc6b2ede14b0ea00a5870a11b57ced33f

    SHA256

    6aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1

    SHA512

    5855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1

  • C:\Users\Admin\AppData\Local\Temp\plqrk.log

    Filesize

    192B

    MD5

    b8791423e105cba91d3e8e28e9c6cf69

    SHA1

    a2bfc736f15aea2a755cef1bdd1f8e7c2035e971

    SHA256

    ddc53676432ca0ed32390a6b05fd46baa55c849dfca3a22ed54f095d89a01c46

    SHA512

    c31acedbf5327842e445fded70e21fe496cef6987e4ac99af550049d2383e015bc4c1e8aaaf1295e3a70417ecb5f98980a89092226b11b2879d207744543d9ed

  • C:\Users\Admin\AppData\Local\Temp\tmp2534.tmp

    Filesize

    27KB

    MD5

    e8935d71ab624e85edcbfbaddc564ce5

    SHA1

    c71a191dd851485687439047966fa08b710d5f4f

    SHA256

    e338bc0a9e83cef012008e9e15cb0fda1787b04dd7410a57c283d09f9eebe96f

    SHA512

    df98867dfdfc32734a7bf9f6c7e9d3a4afba5e1ed03a50c268b5f0cbe8baab66bede9999ff359367c13d099309a4b4163426fe93612800907ca413b7e2fd6740

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    224B

    MD5

    a0d51460224c82e843ab5b70c37738fa

    SHA1

    45e9fb2253b7a2b87e89ab589c0b608f363ad254

    SHA256

    8c2f3ae43fb42d19a776c21caa900a8d1518ce9f2d000134f104822e0178c11d

    SHA512

    2bfe2b75c5f00940c4ca5e8d0bfab503c090250a340402e0e2043431bc7f19e0cd717542be6a289912d77a1e52996ef0dc1171b929f5972de9aeb8d762986609

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    224B

    MD5

    0b60190c61b5ae1ff4de5d2b524435d0

    SHA1

    252877380367d57081c005fe6875095f56b734ac

    SHA256

    5b516468af846c8951d0e12b0b5ffdc405b4a6629a3046efdb858de178b44e6f

    SHA512

    9cb1f439381c0e2434c2afa5b0bf27cb817cef1c32f72effa15cf24e7c8d2855e2425b7c6aa6ba63630b73b55967bb558819adefe91e055f8c9d693c7f9fa838

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    224B

    MD5

    119ecfd0ca2c03bea4c98c7cff1144d2

    SHA1

    b4c332c95667e4b892a318b2f9ae953e4ab9b668

    SHA256

    04881de81dec68345054db03fa578926c08e4b6b16f492f35b2880978c6c842d

    SHA512

    bf12f3789aad3358cee54456a16d4474ff0255cc096bc5cce907484303d294440816a685a6476efaf3444a4b4a2c447578c32f90eb5dd12dd57113129a0e22c1

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/1128-16-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1128-26-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1128-38-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1128-40-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1128-28-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1128-249-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1128-45-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1128-33-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1128-50-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1128-21-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1128-200-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1128-15-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1128-7-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1128-207-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1128-183-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1128-205-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3036-49-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/3036-199-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/3036-206-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/3036-182-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/3036-0-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/3036-248-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/3036-44-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/3036-13-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB