Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-01-2025 08:01
Behavioral task
behavioral1
Sample
JaffaCakes118_7893ade1869d84637d805ebec5f14fc1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7893ade1869d84637d805ebec5f14fc1.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_7893ade1869d84637d805ebec5f14fc1.exe
-
Size
47KB
-
MD5
7893ade1869d84637d805ebec5f14fc1
-
SHA1
7f5a15dc0755c98ddb82aac5eba7949fdd575ad5
-
SHA256
e13544672d37641d0c5a286ef50ba755cf8eec649e0e0668f1d74b7fa6a38ff8
-
SHA512
c0f1eeb71e9efba9987514e7bb6aa9e1a032d9774c008a45799787f85381f3ac7e8e223a38b47bd34b79b027d4f3156137638562f49442ad8c04aa4385074658
-
SSDEEP
768:jv8IRRdsxq1DjJcq7g9Ot25cmxoCayf1v1iPfDmBGz5T:DxRTsxq1DjCPOtXHCaWiPfDwW5T
Malware Config
Signatures
-
Detects MyDoom family 7 IoCs
resource yara_rule behavioral1/memory/2016-15-0x0000000000500000-0x0000000000515000-memory.dmp family_mydoom behavioral1/memory/2016-47-0x0000000000500000-0x0000000000515000-memory.dmp family_mydoom behavioral1/memory/2016-68-0x0000000000500000-0x0000000000515000-memory.dmp family_mydoom behavioral1/memory/2016-70-0x0000000000500000-0x0000000000515000-memory.dmp family_mydoom behavioral1/memory/2016-75-0x0000000000500000-0x0000000000515000-memory.dmp family_mydoom behavioral1/memory/2016-82-0x0000000000500000-0x0000000000515000-memory.dmp family_mydoom behavioral1/memory/2016-87-0x0000000000500000-0x0000000000515000-memory.dmp family_mydoom -
Mydoom family
-
Executes dropped EXE 1 IoCs
pid Process 3060 services.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" JaffaCakes118_7893ade1869d84637d805ebec5f14fc1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
resource yara_rule behavioral1/memory/2016-0-0x0000000000500000-0x0000000000515000-memory.dmp upx behavioral1/memory/2016-4-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/files/0x0008000000016652-7.dat upx behavioral1/memory/2016-15-0x0000000000500000-0x0000000000515000-memory.dmp upx behavioral1/memory/3060-18-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3060-19-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3060-24-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3060-29-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3060-31-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3060-36-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3060-41-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3060-43-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2016-47-0x0000000000500000-0x0000000000515000-memory.dmp upx behavioral1/memory/3060-48-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/files/0x0005000000004ed7-58.dat upx behavioral1/memory/2016-68-0x0000000000500000-0x0000000000515000-memory.dmp upx behavioral1/memory/3060-69-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2016-70-0x0000000000500000-0x0000000000515000-memory.dmp upx behavioral1/memory/3060-71-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3060-76-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2016-75-0x0000000000500000-0x0000000000515000-memory.dmp upx behavioral1/memory/3060-81-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2016-82-0x0000000000500000-0x0000000000515000-memory.dmp upx behavioral1/memory/3060-83-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3060-88-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2016-87-0x0000000000500000-0x0000000000515000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe JaffaCakes118_7893ade1869d84637d805ebec5f14fc1.exe File opened for modification C:\Windows\java.exe JaffaCakes118_7893ade1869d84637d805ebec5f14fc1.exe File created C:\Windows\java.exe JaffaCakes118_7893ade1869d84637d805ebec5f14fc1.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7893ade1869d84637d805ebec5f14fc1.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2016 wrote to memory of 3060 2016 JaffaCakes118_7893ade1869d84637d805ebec5f14fc1.exe 30 PID 2016 wrote to memory of 3060 2016 JaffaCakes118_7893ade1869d84637d805ebec5f14fc1.exe 30 PID 2016 wrote to memory of 3060 2016 JaffaCakes118_7893ade1869d84637d805ebec5f14fc1.exe 30 PID 2016 wrote to memory of 3060 2016 JaffaCakes118_7893ade1869d84637d805ebec5f14fc1.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7893ade1869d84637d805ebec5f14fc1.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7893ade1869d84637d805ebec5f14fc1.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD54680af117fd5a600f759b04d8d6fc171
SHA1332ec3ff22f1df002b90fec6cc3475c64b9d9c4a
SHA25661fd8e48c86f810f2c085839ad973a462a798233fab401435bd8b475aa2edc49
SHA512a50d67e7a3787fe4f6f1b55a8e2434feaea5b29116c9e9c4914ea829bd22b1b2145fc687e0563cc165a25353b98c9be512df96fbd6c7967bdf81469c54d27937
-
Filesize
64B
MD565d6f5c2efe7e8ec85220711fbe8872b
SHA1b8382463d4c553ea9a7cfd479df654c337cb3684
SHA256e7950405177d9a302a64745483966fb898428486521c37cd78c74beb399433a7
SHA512181be52b682584c255fef0454783d341cc4f139d85eb992775e8e311d3da45b6e8457028dd8ac4ca90a811d9f20c95285d6890357fc9009d7ba54bf87c21d693
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2