Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-01-2025 17:06

General

  • Target

    JaffaCakes118_b2ae951c98bf12c2156ff8fa516ed028.exe

  • Size

    60KB

  • MD5

    b2ae951c98bf12c2156ff8fa516ed028

  • SHA1

    b62ca854b901ec103119571097f3b288369ba84e

  • SHA256

    04b388fc0c7bacdecd97bdce79bd8cb5b00b8973f82408c877f209b7aa279813

  • SHA512

    bbdef5d138e42ce50a642ef15a5579e6a082f851f4d87fc0f37743f95e76f0549537f8d14f45462bdf6b07eae005f3977f9fbc4062219d6d95757ebe6ae923dd

  • SSDEEP

    1536:/g7wc1aGNC0klI7CPN3cfmPxUYmy1MzK1wy3:I7wc1aOCo7C13zCzy1n1f

Malware Config

Signatures

  • Detects MyDoom family 3 IoCs
  • MyDoom

    MyDoom is a Worm that is written in C++.

  • Mydoom family
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b2ae951c98bf12c2156ff8fa516ed028.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b2ae951c98bf12c2156ff8fa516ed028.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:2872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Common Files\microsoft shared\ink\ar-SA\Winamp 5.0 (en) Crack.exe

    Filesize

    60KB

    MD5

    b2ae951c98bf12c2156ff8fa516ed028

    SHA1

    b62ca854b901ec103119571097f3b288369ba84e

    SHA256

    04b388fc0c7bacdecd97bdce79bd8cb5b00b8973f82408c877f209b7aa279813

    SHA512

    bbdef5d138e42ce50a642ef15a5579e6a082f851f4d87fc0f37743f95e76f0549537f8d14f45462bdf6b07eae005f3977f9fbc4062219d6d95757ebe6ae923dd

  • C:\Users\Admin\AppData\Local\Temp\tmp3796.tmp

    Filesize

    59KB

    MD5

    5faae4e0e598a0cc33fe316846881d85

    SHA1

    51b2ecf331d9ab9b158cbdd87ee19ec44f2a90e8

    SHA256

    b56a549f31b17f05efedd9ed20ebd8a1ceb1e5b4dc45e48667aab9bbec0e341d

    SHA512

    599a450bf880c46ebdf87ad5f130874082136160a2b21c9d22b6fb476a13924c3d956ef8dfb0a5f491557a114197856d0470baafd69cef2af678ba8f0b184cef

  • memory/2872-0-0x0000000000800000-0x000000000080A000-memory.dmp

    Filesize

    40KB

  • memory/2872-23-0x0000000000800000-0x000000000080A000-memory.dmp

    Filesize

    40KB