Analysis

  • max time kernel
    0s
  • max time network
    1s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29/03/2025, 19:37

General

  • Target

    JaffaCakes118_95326fe65fbbe50683370601b15cfd74.exe

  • Size

    28KB

  • MD5

    95326fe65fbbe50683370601b15cfd74

  • SHA1

    f09a479d1d3143be076788364176b20025cbf78c

  • SHA256

    cf2f73ea12837040efa84390b4411f584daf3320b96be6d772ee7c48ed57077e

  • SHA512

    15040f2d26aa1c6701a1a13d58c2849fcf9f12ce03b682bd989f71cec37f83597ac1869745dd6bdc4b94a5ba4afa92e288c409c184889164dd6b02efa166b54c

  • SSDEEP

    384:1vxBbK26lj5Id8SpHx9jLhsznnVxA1WmP5w7GGCJlqqwMyNH6:Dv8IRRdsxq1DjJcqfO6

Score
10/10

Malware Config

Signatures

  • Detects MyDoom family 2 IoCs
  • MyDoom

    MyDoom is a Worm that is written in C++.

  • Mydoom family
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_95326fe65fbbe50683370601b15cfd74.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_95326fe65fbbe50683370601b15cfd74.exe"
    1⤵
      PID:2336
      • C:\Windows\services.exe
        "C:\Windows\services.exe"
        2⤵
          PID:2412

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\services.exe

        Filesize

        8KB

        MD5

        b0fe74719b1b647e2056641931907f4a

        SHA1

        e858c206d2d1542a79936cb00d85da853bfc95e2

        SHA256

        bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

        SHA512

        9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

      • memory/2336-2-0x0000000000500000-0x0000000000510000-memory.dmp

        Filesize

        64KB

      • memory/2336-4-0x0000000000400000-0x0000000000408000-memory.dmp

        Filesize

        32KB

      • memory/2336-9-0x0000000000400000-0x0000000000408000-memory.dmp

        Filesize

        32KB

      • memory/2412-11-0x0000000000400000-0x0000000000408000-memory.dmp

        Filesize

        32KB