Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01-01-2025 04:18

General

  • Target

    JaffaCakes118_46e02ad952472cdb69341350dfd66910.exe

  • Size

    28KB

  • MD5

    46e02ad952472cdb69341350dfd66910

  • SHA1

    4d4e5f4fdc361a78fa1720fc28455dbb04c832bf

  • SHA256

    f47a63a7ebd619165358567db1d0849c80b9894831d4f394fb02560c6302cd7e

  • SHA512

    12f34d23dc5385ce647f6a6957f08b61847ca59d1ee0b4d1319e1144a23bb54f6ded3b341905c867bd9af1d9ca87cb0a059f898729ecc8b097801f99ca29644e

  • SSDEEP

    384:1vxBbK26lj5Id8SpHx9jLhsznnVxA1WmP5w7GGCJlqqwMyNKCWn:Dv8IRRdsxq1DjJcqfPb

Malware Config

Signatures

  • Detects MyDoom family 8 IoCs
  • MyDoom

    MyDoom is a Worm that is written in C++.

  • Mydoom family
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • UPX packed file 28 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_46e02ad952472cdb69341350dfd66910.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_46e02ad952472cdb69341350dfd66910.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:1972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9a037de5c96874828d21c686a00e1adc

    SHA1

    d4762d150293b1d7ecb8ad2b270ccb7e69429a30

    SHA256

    a452f748345fd8f2fc445d90572e12252b24dd1e743c25212fba2f4581bdd79d

    SHA512

    e6cd2c7f7ff046cccece1cd065e1406a80e379a4089d6b75ae8c9303ee7786f4a53e503451db01ac855bb46e5d2bc3f1224d2d6dac54ec570fc50ac7d2b8ee6a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    578c4adeda8b28f74c3b58b092e37d75

    SHA1

    554f43faa99c2d9120a24b55adae0f0092dcfbaa

    SHA256

    88e14505fde238b5be4724609065fe885a6ca405c28da656a92e0659d7fae7ae

    SHA512

    fd91a6de15bea16c9cfb1e76689acc9a26cd5bcb00ccfc3617266428b1cf09e5cd99184a5e78e3412462de86deb8e63818b6b8143f39c33ef1a6be92b54ec168

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\39GEHZPO\search[1].htm

    Filesize

    25B

    MD5

    8ba61a16b71609a08bfa35bc213fce49

    SHA1

    8374dddcc6b2ede14b0ea00a5870a11b57ced33f

    SHA256

    6aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1

    SHA512

    5855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1

  • C:\Users\Admin\AppData\Local\Temp\Cab9E6A.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar9EEA.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\tmp9253.tmp

    Filesize

    28KB

    MD5

    9211f40dd1a2f51acaeac7fdf2367a27

    SHA1

    416a1009809f43f3a8130183577a62c52e8ecb06

    SHA256

    ec85d6c3c1374b19840fa28de1f6eee683306dc54894daee0afea678638fdf46

    SHA512

    339fe26a2459f8aebd454bcaaec91ab8399105ceaf146fffe9123be39ff55c8c8b76d56d13b5ef8f58f602c4094580b5e9bc04633ce5949cdd5f063599cbe871

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    1KB

    MD5

    29f01c70c968e4844b2dad35afc5396a

    SHA1

    35d32221e518e3ba95d15b7cd66692f004e3aa6b

    SHA256

    31d1830d7b8a75d421303b29e3e5db450d05d0169d8872641a8dc02681638eee

    SHA512

    bdd3e480f2789b0e371dfb898e7fac15da5915d7c17b003b780b8d65d7c93edadcdc9796f07468f05019b825ea9b3c62dcc56504ec364d17e97ee25c3d9f355e

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    1KB

    MD5

    16a191813b3c5eb1e56b8a48e4933fc4

    SHA1

    d20a44e8081155338a544303a626e201c1ec3770

    SHA256

    d7bef492515870ddc4041b8ddfac06f81bb70cc543edf2cf81e4a59055d601a6

    SHA512

    15d592438a776bd8e4b9d6f7dfc3852df30192d38f80013719692731f1e35ad0acf7eb31b1d3f4ac8a417cc8248562d7ae6f2a07a333159aa5a8b4ab70a31f7f

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/1972-18-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1972-57-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1972-36-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1972-41-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1972-29-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1972-24-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1972-19-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1972-31-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1972-78-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1972-61-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1972-97-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1972-66-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1972-68-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1972-274-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1972-73-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2184-60-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2184-72-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2184-96-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2184-65-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2184-2-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2184-56-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2184-35-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2184-16-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2184-8-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2184-273-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2184-4-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB