Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 03:52
Behavioral task
behavioral1
Sample
JaffaCakes118_8a4f49d003f0a699e2648a556ea078f2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8a4f49d003f0a699e2648a556ea078f2.exe
Resource
win10v2004-20250313-en
General
-
Target
JaffaCakes118_8a4f49d003f0a699e2648a556ea078f2.exe
-
Size
45KB
-
MD5
8a4f49d003f0a699e2648a556ea078f2
-
SHA1
04ffb0464d152636f8cb44623a715a1b04001920
-
SHA256
48d496b6f368b7bc6f89a1f77d6d68ec5576b74a616afac7991326fe02ec434b
-
SHA512
e4a0b9fc2c848aa233bbd800306aafe6d4017cf55a810617a21a7562535da6b5e9e0eb18f503817512e5bff1fee88250f4ca3de1c37d9cfded12b92da37a2d8e
-
SSDEEP
768:SCIqdH/k1ZVcT194jp4yn9eOeFvEPfFW9561QpK8cg7IRiVtaTNRT3msNMX:SNqaLV8a6yn9VnSA4K8cgtVsJJmgMX
Malware Config
Signatures
-
Detects MyDoom family 21 IoCs
resource yara_rule behavioral2/memory/720-9-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/3556-86-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/5588-87-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/5588-147-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/3556-172-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/5588-173-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/5588-252-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/3556-316-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/5588-318-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/5588-324-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/3556-325-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/5588-326-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/5588-330-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/3556-331-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/5588-334-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/3556-335-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/3556-359-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/5588-360-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/3556-449-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/3556-471-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom behavioral2/memory/5588-472-0x0000000000800000-0x000000000080D000-memory.dmp family_mydoom -
Mydoom family
-
Executes dropped EXE 2 IoCs
pid Process 5588 lsass.exe 720 lsass.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Traybar = "C:\\Windows\\lsass.exe" JaffaCakes118_8a4f49d003f0a699e2648a556ea078f2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Traybar = "C:\\Windows\\lsass.exe" lsass.exe -
resource yara_rule behavioral2/memory/3556-0-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/files/0x00090000000241ef-4.dat upx behavioral2/memory/720-9-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/3556-86-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/5588-87-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/5588-147-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/3556-172-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/5588-173-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/5588-252-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/3556-316-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/5588-318-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/5588-324-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/3556-325-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/5588-326-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/5588-330-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/3556-331-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/5588-334-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/3556-335-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/3556-359-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/5588-360-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/3556-449-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/3556-471-0x0000000000800000-0x000000000080D000-memory.dmp upx behavioral2/memory/5588-472-0x0000000000800000-0x000000000080D000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Common Files\microsoft shared\ink\ar-SA\WinRAR.v.3.2.and.key.ShareReactor.com lsass.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\Winamp 5.0 (en).ShareReactor.com lsass.exe File created C:\Program Files\Common Files\microsoft shared\Triedit\Winamp 5.0 (en) Crack.exe lsass.exe File created C:\Program Files\Common Files\microsoft shared\VC\WinRAR.v.3.2.and.key.exe lsass.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\pt-BR\Winamp 5.0 (en) Crack.ShareReactor.com lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Help\Winamp 5.0 (en).exe lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\DataModel\Cartridges\Winamp 5.0 (en) Crack.ShareReactor.com lsass.exe File created C:\Program Files\Common Files\microsoft shared\ink\fr-FR\index.ShareReactor.com JaffaCakes118_8a4f49d003f0a699e2648a556ea078f2.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\ICQ 4 Lite.ShareReactor.com lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\Winamp 5.0 (en) Crack.ShareReactor.com lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\BLUEPRNT\WinRAR.v.3.2.and.key.ShareReactor.com lsass.exe File created C:\Program Files\Windows Media Player\Network Sharing\ICQ 4 Lite.ShareReactor.com lsass.exe File created C:\Program Files\Common Files\microsoft shared\ink\sv-SE\index.ShareReactor.com JaffaCakes118_8a4f49d003f0a699e2648a556ea078f2.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\zh-Hant\Winamp 5.0 (en) Crack.ShareReactor.com JaffaCakes118_8a4f49d003f0a699e2648a556ea078f2.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\es\WinRAR.v.3.2.and.key.exe JaffaCakes118_8a4f49d003f0a699e2648a556ea078f2.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ko\ICQ 4 Lite.exe JaffaCakes118_8a4f49d003f0a699e2648a556ea078f2.exe File created C:\Program Files\Common Files\microsoft shared\VSTO\WinRAR.v.3.2.and.key.com lsass.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ko\Winamp 5.0 (en) Crack.com lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\SLATE\Kazaa Lite.ShareReactor.com lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\VBA\VBA7.1\Winamp 5.0 (en) Crack.exe lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\VBA\VBA7.1\Winamp 5.0 (en).exe lsass.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\index.ShareReactor.com JaffaCakes118_8a4f49d003f0a699e2648a556ea078f2.exe File created C:\Program Files\Common Files\microsoft shared\ink\zh-CN\ICQ 4 Lite.ShareReactor.com JaffaCakes118_8a4f49d003f0a699e2648a556ea078f2.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\zh-Hant\Winamp 5.0 (en).exe JaffaCakes118_8a4f49d003f0a699e2648a556ea078f2.exe File created C:\Program Files\Common Files\microsoft shared\ink\bg-BG\index.ShareReactor.com lsass.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\Winamp 5.0 (en).com lsass.exe File created C:\Program Files\Common Files\microsoft shared\ink\ja-JP\index.com lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\EDGE\Harry Potter.ShareReactor.com lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\QUAD\Kazaa Lite.com lsass.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\pt-BR\WinRAR.v.3.2.and.key.ShareReactor.com JaffaCakes118_8a4f49d003f0a699e2648a556ea078f2.exe File created C:\Program Files\Common Files\microsoft shared\VSTO\10.0\WinRAR.v.3.2.and.key.exe lsass.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ko\Harry Potter.com lsass.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ru\index.exe lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\BREEZE\index.ShareReactor.com lsass.exe File created C:\Program Files\Common Files\microsoft shared\ink\es-MX\WinRAR.v.3.2.and.key.exe JaffaCakes118_8a4f49d003f0a699e2648a556ea078f2.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\Kazaa Lite.exe JaffaCakes118_8a4f49d003f0a699e2648a556ea078f2.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ICQ 4 Lite.ShareReactor.com JaffaCakes118_8a4f49d003f0a699e2648a556ea078f2.exe File created C:\Program Files\Common Files\microsoft shared\ink\sk-SK\WinRAR.v.3.2.and.key.exe lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\COMPASS\Winamp 5.0 (en) Crack.exe lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\RIPPLE\WinRAR.v.3.2.and.key.exe lsass.exe File created C:\Program Files\Common Files\microsoft shared\VGX\Winamp 5.0 (en).com JaffaCakes118_8a4f49d003f0a699e2648a556ea078f2.exe File created C:\Program Files\Common Files\microsoft shared\ink\fr-CA\Winamp 5.0 (en).exe lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Smart Tag\Winamp 5.0 (en) Crack.com lsass.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\index.ShareReactor.com JaffaCakes118_8a4f49d003f0a699e2648a556ea078f2.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\es\Winamp 5.0 (en) Crack.com JaffaCakes118_8a4f49d003f0a699e2648a556ea078f2.exe File created C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\Harry Potter.ShareReactor.com lsass.exe File created C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\index.com lsass.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pl\ICQ 4 Lite.ShareReactor.com lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Harry Potter.exe lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\Winamp 5.0 (en).exe lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\Cultures\index.com lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\Web Server Extensions\16\index.ShareReactor.com lsass.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\es\Harry Potter.exe lsass.exe File created C:\Program Files\Common Files\microsoft shared\WinRAR.v.3.2.and.key.ShareReactor.com JaffaCakes118_8a4f49d003f0a699e2648a556ea078f2.exe File created C:\Program Files\Common Files\microsoft shared\ink\en-GB\WinRAR.v.3.2.and.key.exe JaffaCakes118_8a4f49d003f0a699e2648a556ea078f2.exe File created C:\Program Files\Common Files\microsoft shared\ink\tr-TR\Kazaa Lite.ShareReactor.com JaffaCakes118_8a4f49d003f0a699e2648a556ea078f2.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\ICQ 4 Lite.ShareReactor.com lsass.exe File created C:\Program Files\Common Files\microsoft shared\ink\pt-PT\Winamp 5.0 (en) Crack.com lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\AXIS\Harry Potter.ShareReactor.com lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\STRTEDGE\Winamp 5.0 (en) Crack.exe lsass.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Web Server Extensions\Kazaa Lite.com lsass.exe File created C:\Program Files\Common Files\microsoft shared\ink\sr-Latn-RS\Winamp 5.0 (en) Crack.com JaffaCakes118_8a4f49d003f0a699e2648a556ea078f2.exe File created C:\Program Files\Common Files\microsoft shared\MSInfo\Harry Potter.com JaffaCakes118_8a4f49d003f0a699e2648a556ea078f2.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\de\WinRAR.v.3.2.and.key.com JaffaCakes118_8a4f49d003f0a699e2648a556ea078f2.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\lsass.exe JaffaCakes118_8a4f49d003f0a699e2648a556ea078f2.exe File created C:\Windows\lsass.exe JaffaCakes118_8a4f49d003f0a699e2648a556ea078f2.exe File opened for modification C:\Windows\lsass.exe lsass.exe File created C:\Windows\lsass.exe lsass.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8a4f49d003f0a699e2648a556ea078f2.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5700 wrote to memory of 5588 5700 cmd.exe 87 PID 5700 wrote to memory of 5588 5700 cmd.exe 87 PID 5700 wrote to memory of 5588 5700 cmd.exe 87 PID 4964 wrote to memory of 720 4964 cmd.exe 90 PID 4964 wrote to memory of 720 4964 cmd.exe 90 PID 4964 wrote to memory of 720 4964 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8a4f49d003f0a699e2648a556ea078f2.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8a4f49d003f0a699e2648a556ea078f2.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3556
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\lsass.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5700 -
C:\Windows\lsass.exeC:\Windows\lsass.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5588
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\lsass.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\lsass.exeC:\Windows\lsass.exe2⤵
- Executes dropped EXE
PID:720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD541a983401b9b1528ac20ccf45afcc2a7
SHA162680c03c8f1e1c41c14db6551a1e60acc1de456
SHA2561ab70a80a6db0f47cac336218cb0af20579ef9866c9f03ae7cf75034f28bd11b
SHA5124bd3e0f45fe323b69d33c08909e9da6d414c59175c47cff2e08a5307c9bb6ca352d0855ad9dde1788e1c2bf1631611e70ad76a4f95182f8efd376bdcdba7c65a
-
Filesize
45KB
MD58a4f49d003f0a699e2648a556ea078f2
SHA104ffb0464d152636f8cb44623a715a1b04001920
SHA25648d496b6f368b7bc6f89a1f77d6d68ec5576b74a616afac7991326fe02ec434b
SHA512e4a0b9fc2c848aa233bbd800306aafe6d4017cf55a810617a21a7562535da6b5e9e0eb18f503817512e5bff1fee88250f4ca3de1c37d9cfded12b92da37a2d8e