Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/04/2025, 09:30

General

  • Target

    JaffaCakes118_b1d2b77aeaa2cd9df48f1ea3a272c124.exe

  • Size

    58KB

  • MD5

    b1d2b77aeaa2cd9df48f1ea3a272c124

  • SHA1

    3f57281db53ca952883250aa53a817ea84f4c172

  • SHA256

    525201fab00b205c8eb49ee1f814805f797c9c9bbc71f1978454dcfc9d3bd498

  • SHA512

    af59fd389e3285925c361ce8f012e5dd9023a96df97844ec669a758d513a6b3e5f3413f7ec630fd34ad1a655927e0bb67a0383a356cb568dd40d0f15bc6b38f1

  • SSDEEP

    768:SCIqdH/k1ZVcT194jp4z8uSl/yjB7mre6O3BdaJeaRVYGt5mzG3qYwfCmh3LUC6h:SNqaLV8a6z8u+MBhL3uJ9Z5SEmh3Ylh

Malware Config

Signatures

  • Detects MyDoom family 20 IoCs
  • MyDoom

    MyDoom is a Worm that is written in C++.

  • Mydoom family
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • UPX packed file 22 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b1d2b77aeaa2cd9df48f1ea3a272c124.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b1d2b77aeaa2cd9df48f1ea3a272c124.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:5452
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c C:\Windows\lsass.exe
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2428
    • C:\Windows\lsass.exe
      C:\Windows\lsass.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:4128
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c C:\Windows\lsass.exe
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5252
    • C:\Windows\lsass.exe
      C:\Windows\lsass.exe
      2⤵
      • Executes dropped EXE
      PID:3248

Network

MITRE ATT&CK Enterprise v16

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tjqs4s.txt

    Filesize

    37KB

    MD5

    3d54c522b34741745875fb1e9c942b24

    SHA1

    3b338454ce353b1a256e3ad719315391125e76a9

    SHA256

    f0b5a2fe856af8a9d1d6846485ffe708ec8c6fe0e3cb8094dd9f3a76ba4d9e3e

    SHA512

    70a1ce8c3f10a4957eb26a926fe5d207bf7fcfa7774087cf7a0161cccbd77c954edefc65b76dba63e787d993d05c80235d3ec9d69d87a7489b54bae4830056b1

  • C:\Windows\lsass.exe

    Filesize

    58KB

    MD5

    b1d2b77aeaa2cd9df48f1ea3a272c124

    SHA1

    3f57281db53ca952883250aa53a817ea84f4c172

    SHA256

    525201fab00b205c8eb49ee1f814805f797c9c9bbc71f1978454dcfc9d3bd498

    SHA512

    af59fd389e3285925c361ce8f012e5dd9023a96df97844ec669a758d513a6b3e5f3413f7ec630fd34ad1a655927e0bb67a0383a356cb568dd40d0f15bc6b38f1

  • memory/3248-10-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB

  • memory/4128-299-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB

  • memory/4128-578-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB

  • memory/4128-88-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB

  • memory/4128-140-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB

  • memory/4128-441-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB

  • memory/4128-166-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB

  • memory/4128-245-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB

  • memory/4128-305-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB

  • memory/4128-297-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB

  • memory/5452-296-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB

  • memory/5452-300-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB

  • memory/5452-0-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB

  • memory/5452-306-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB

  • memory/5452-357-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB

  • memory/5452-430-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB

  • memory/5452-440-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB

  • memory/5452-165-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB

  • memory/5452-488-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB

  • memory/5452-577-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB

  • memory/5452-87-0x0000000000800000-0x000000000080D000-memory.dmp

    Filesize

    52KB