Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 22:31
Behavioral task
behavioral1
Sample
e8935d71ab624e85edcbfbaddc564ce5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e8935d71ab624e85edcbfbaddc564ce5_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e8935d71ab624e85edcbfbaddc564ce5_JaffaCakes118.exe
-
Size
27KB
-
MD5
e8935d71ab624e85edcbfbaddc564ce5
-
SHA1
c71a191dd851485687439047966fa08b710d5f4f
-
SHA256
e338bc0a9e83cef012008e9e15cb0fda1787b04dd7410a57c283d09f9eebe96f
-
SHA512
df98867dfdfc32734a7bf9f6c7e9d3a4afba5e1ed03a50c268b5f0cbe8baab66bede9999ff359367c13d099309a4b4163426fe93612800907ca413b7e2fd6740
-
SSDEEP
384:1vxBbK26lj5Id8SpHx9jLhsznnVxA1WmP5w7GGCJlqqwMyN6V:Dv8IRRdsxq1DjJcqflV
Malware Config
Signatures
-
Detects MyDoom family 7 IoCs
resource yara_rule behavioral2/memory/3036-13-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral2/memory/3036-44-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral2/memory/3036-49-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral2/memory/3036-182-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral2/memory/3036-199-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral2/memory/3036-206-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral2/memory/3036-248-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom -
Mydoom family
-
Executes dropped EXE 1 IoCs
pid Process 1128 services.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" e8935d71ab624e85edcbfbaddc564ce5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
resource yara_rule behavioral2/memory/3036-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/1128-7-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/files/0x0008000000023c7e-6.dat upx behavioral2/memory/3036-13-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/1128-15-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1128-16-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1128-21-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1128-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1128-28-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1128-33-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1128-38-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1128-40-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3036-44-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/1128-45-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3036-49-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/1128-50-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/files/0x0004000000000705-60.dat upx behavioral2/memory/3036-182-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/1128-183-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3036-199-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/1128-200-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1128-205-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3036-206-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/1128-207-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3036-248-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/1128-249-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe e8935d71ab624e85edcbfbaddc564ce5_JaffaCakes118.exe File opened for modification C:\Windows\java.exe e8935d71ab624e85edcbfbaddc564ce5_JaffaCakes118.exe File created C:\Windows\java.exe e8935d71ab624e85edcbfbaddc564ce5_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e8935d71ab624e85edcbfbaddc564ce5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3036 wrote to memory of 1128 3036 e8935d71ab624e85edcbfbaddc564ce5_JaffaCakes118.exe 84 PID 3036 wrote to memory of 1128 3036 e8935d71ab624e85edcbfbaddc564ce5_JaffaCakes118.exe 84 PID 3036 wrote to memory of 1128 3036 e8935d71ab624e85edcbfbaddc564ce5_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8935d71ab624e85edcbfbaddc564ce5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e8935d71ab624e85edcbfbaddc564ce5_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
162KB
MD581fd403ffe3bd397c699e62b0583260e
SHA1c34a50e3857ff8da01b259061ce25eef1b73705b
SHA256545bfaf6ca58f5fc3fabb525d6957de6d5911b1d8b350c8fa0461871784c2180
SHA5125cab590eea1c91878ddf67a654a444b280b59110c476820f7314e40e0ea2a8ac9ea3f560a8b9e75903da53bf739a9c2c4e0e070ecd59c6f10d42d3a1b5a2daac
-
Filesize
145KB
MD59dfe4ccd28c1695a7b4ef64b4e9fcdab
SHA110d40e931942f8d42298798ed999c584faed3643
SHA2563c28d4464d139bd5b6e606cde1a8aee73095cf4cf2db542d1fa5d5a866595380
SHA512966dc82362f09fb5229e8ccceb3e1b850040c96e763be942133a43dddc31f1d18fa2d85c3898582c58649037cba769185e0e5f60de14228200791d275bdcd339
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
192B
MD5b8791423e105cba91d3e8e28e9c6cf69
SHA1a2bfc736f15aea2a755cef1bdd1f8e7c2035e971
SHA256ddc53676432ca0ed32390a6b05fd46baa55c849dfca3a22ed54f095d89a01c46
SHA512c31acedbf5327842e445fded70e21fe496cef6987e4ac99af550049d2383e015bc4c1e8aaaf1295e3a70417ecb5f98980a89092226b11b2879d207744543d9ed
-
Filesize
27KB
MD5e8935d71ab624e85edcbfbaddc564ce5
SHA1c71a191dd851485687439047966fa08b710d5f4f
SHA256e338bc0a9e83cef012008e9e15cb0fda1787b04dd7410a57c283d09f9eebe96f
SHA512df98867dfdfc32734a7bf9f6c7e9d3a4afba5e1ed03a50c268b5f0cbe8baab66bede9999ff359367c13d099309a4b4163426fe93612800907ca413b7e2fd6740
-
Filesize
224B
MD5a0d51460224c82e843ab5b70c37738fa
SHA145e9fb2253b7a2b87e89ab589c0b608f363ad254
SHA2568c2f3ae43fb42d19a776c21caa900a8d1518ce9f2d000134f104822e0178c11d
SHA5122bfe2b75c5f00940c4ca5e8d0bfab503c090250a340402e0e2043431bc7f19e0cd717542be6a289912d77a1e52996ef0dc1171b929f5972de9aeb8d762986609
-
Filesize
224B
MD50b60190c61b5ae1ff4de5d2b524435d0
SHA1252877380367d57081c005fe6875095f56b734ac
SHA2565b516468af846c8951d0e12b0b5ffdc405b4a6629a3046efdb858de178b44e6f
SHA5129cb1f439381c0e2434c2afa5b0bf27cb817cef1c32f72effa15cf24e7c8d2855e2425b7c6aa6ba63630b73b55967bb558819adefe91e055f8c9d693c7f9fa838
-
Filesize
224B
MD5119ecfd0ca2c03bea4c98c7cff1144d2
SHA1b4c332c95667e4b892a318b2f9ae953e4ab9b668
SHA25604881de81dec68345054db03fa578926c08e4b6b16f492f35b2880978c6c842d
SHA512bf12f3789aad3358cee54456a16d4474ff0255cc096bc5cce907484303d294440816a685a6476efaf3444a4b4a2c447578c32f90eb5dd12dd57113129a0e22c1
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2