Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 01:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
JaffaCakes118_696f83e20b4bcfb882a16595eedf67c1.exe
Resource
win7-20241010-en
windows7-x64
6 signatures
150 seconds
General
-
Target
JaffaCakes118_696f83e20b4bcfb882a16595eedf67c1.exe
-
Size
87KB
-
MD5
696f83e20b4bcfb882a16595eedf67c1
-
SHA1
44da6425de365338e869cd452afacff3616587cf
-
SHA256
e14c2a93f781c415d929c3ca01e5ffa68bd7351a1f6902f9b3abd5cbd94b4094
-
SHA512
37f76d74532a8d283fef950fa8c36d507d3494ec9e332fd9b263bf4b2120cc33106aba84c51bd44bfe07f43c099be8d01290a1106e7d072b1f2c24e02763562e
-
SSDEEP
1536:MBp4lXVB1WRydFMQaKBZRS30tJK4owAFmPE3TGBt3g4OolO1v/Jg5EG/iUbw:MBOZPHOmP4Et3gv1nJgZi9
Malware Config
Signatures
-
Detects MyDoom family 2 IoCs
resource yara_rule behavioral1/memory/2932-5-0x00000000004A0000-0x00000000004AD000-memory.dmp family_mydoom behavioral1/memory/2932-3-0x00000000004A0000-0x00000000004AD000-memory.dmp family_mydoom -
Mydoom family
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2124 set thread context of 2932 2124 JaffaCakes118_696f83e20b4bcfb882a16595eedf67c1.exe 30 PID 2124 set thread context of 2460 2124 JaffaCakes118_696f83e20b4bcfb882a16595eedf67c1.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_696f83e20b4bcfb882a16595eedf67c1.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2932 2124 JaffaCakes118_696f83e20b4bcfb882a16595eedf67c1.exe 30 PID 2124 wrote to memory of 2932 2124 JaffaCakes118_696f83e20b4bcfb882a16595eedf67c1.exe 30 PID 2124 wrote to memory of 2932 2124 JaffaCakes118_696f83e20b4bcfb882a16595eedf67c1.exe 30 PID 2124 wrote to memory of 2932 2124 JaffaCakes118_696f83e20b4bcfb882a16595eedf67c1.exe 30 PID 2124 wrote to memory of 2932 2124 JaffaCakes118_696f83e20b4bcfb882a16595eedf67c1.exe 30 PID 2124 wrote to memory of 2932 2124 JaffaCakes118_696f83e20b4bcfb882a16595eedf67c1.exe 30 PID 2124 wrote to memory of 2932 2124 JaffaCakes118_696f83e20b4bcfb882a16595eedf67c1.exe 30 PID 2124 wrote to memory of 2932 2124 JaffaCakes118_696f83e20b4bcfb882a16595eedf67c1.exe 30 PID 2124 wrote to memory of 2460 2124 JaffaCakes118_696f83e20b4bcfb882a16595eedf67c1.exe 31 PID 2124 wrote to memory of 2460 2124 JaffaCakes118_696f83e20b4bcfb882a16595eedf67c1.exe 31 PID 2124 wrote to memory of 2460 2124 JaffaCakes118_696f83e20b4bcfb882a16595eedf67c1.exe 31 PID 2124 wrote to memory of 2460 2124 JaffaCakes118_696f83e20b4bcfb882a16595eedf67c1.exe 31 PID 2124 wrote to memory of 2460 2124 JaffaCakes118_696f83e20b4bcfb882a16595eedf67c1.exe 31 PID 2124 wrote to memory of 2460 2124 JaffaCakes118_696f83e20b4bcfb882a16595eedf67c1.exe 31 PID 2124 wrote to memory of 2460 2124 JaffaCakes118_696f83e20b4bcfb882a16595eedf67c1.exe 31 PID 2124 wrote to memory of 2460 2124 JaffaCakes118_696f83e20b4bcfb882a16595eedf67c1.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_696f83e20b4bcfb882a16595eedf67c1.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_696f83e20b4bcfb882a16595eedf67c1.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_696f83e20b4bcfb882a16595eedf67c1.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_696f83e20b4bcfb882a16595eedf67c1.exe"2⤵PID:2932
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_696f83e20b4bcfb882a16595eedf67c1.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_696f83e20b4bcfb882a16595eedf67c1.exe"2⤵PID:2460
-