Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 21:51
Static task
static1
Behavioral task
behavioral1
Sample
4832fcda1a71d75ea615cc30231b7a78_JaffaCakes118.exe
Resource
win7-20240215-en
General
-
Target
4832fcda1a71d75ea615cc30231b7a78_JaffaCakes118.exe
-
Size
425KB
-
MD5
4832fcda1a71d75ea615cc30231b7a78
-
SHA1
102f4b4607e85f3e47afaa1a856759c04163a4b2
-
SHA256
5d6db1d059de822c0f8f7f7a9d872d3e385936d831b14cb4937114c04bb25de9
-
SHA512
5e64a30cf370332f3558e8e43a1514a9e14f7d3bb66da924a0498e679bf78577009d3a71180122a7db6acee883a98b3f1aa571131e23b581e3f8f5a7b9e71e5f
-
SSDEEP
6144:6riTApO8CLavbVUGXjDsDaKaIwLnhc/WGLeGFL7h11UOvTmgyyyyyyyyyyyyyyyy:DGXqzacuGfFxUO7mQDi+6K
Malware Config
Extracted
emotet
Epoch3
186.159.246.121:80
201.210.70.8:8080
46.105.131.68:8080
192.163.221.191:8080
124.150.175.133:80
5.189.148.98:8080
95.216.207.86:7080
189.145.6.189:80
212.112.113.235:80
187.143.219.242:8080
189.132.130.111:8080
190.96.118.15:443
190.217.1.149:80
172.104.70.207:8080
42.190.4.92:443
152.170.220.95:80
203.99.188.11:443
216.75.37.196:8080
190.55.39.215:80
185.45.24.254:7080
181.36.42.205:443
60.52.64.122:80
181.47.235.26:993
70.45.30.28:80
189.218.243.150:443
201.196.15.79:990
187.155.29.74:50000
110.36.234.146:80
138.197.140.163:8080
96.20.84.254:7080
138.186.179.235:8080
23.253.207.142:8080
192.241.220.183:8080
94.177.253.126:80
198.57.217.170:8080
181.198.203.45:443
75.154.163.1:8090
190.117.206.153:443
143.95.101.72:8080
190.113.146.128:8080
200.55.168.82:20
144.76.62.10:8080
181.197.2.80:443
162.241.134.130:8080
186.18.224.149:80
142.93.87.198:8080
113.52.135.33:7080
187.188.166.192:80
154.120.227.206:8080
190.16.101.10:80
51.38.134.203:8080
216.70.88.55:8080
186.84.173.153:80
157.7.164.178:8081
91.109.5.28:8080
211.229.116.130:80
124.150.175.129:8080
176.58.93.123:80
186.109.91.136:80
85.104.121.33:8443
178.249.187.150:7080
186.146.110.108:8080
139.162.185.116:443
83.169.33.157:8080
95.216.212.157:8080
Signatures
-
Loads dropped DLL 4 IoCs
Processes:
4832fcda1a71d75ea615cc30231b7a78_JaffaCakes118.exe4832fcda1a71d75ea615cc30231b7a78_JaffaCakes118.exeadammetered.exeadammetered.exepid process 1512 4832fcda1a71d75ea615cc30231b7a78_JaffaCakes118.exe 2000 4832fcda1a71d75ea615cc30231b7a78_JaffaCakes118.exe 2900 adammetered.exe 2644 adammetered.exe -
Drops file in System32 directory 1 IoCs
Processes:
adammetered.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat adammetered.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 21 IoCs
Processes:
adammetered.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9DAEF1C3-CE53-4BC3-918B-B2B79E5ED177} adammetered.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9DAEF1C3-CE53-4BC3-918B-B2B79E5ED177}\WpadDecision = "0" adammetered.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-34-3a-38-f7-ef\WpadDecision = "0" adammetered.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections adammetered.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad adammetered.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" adammetered.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings adammetered.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" adammetered.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 adammetered.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f005d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 adammetered.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-34-3a-38-f7-ef adammetered.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings adammetered.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" adammetered.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-34-3a-38-f7-ef\WpadDecisionTime = a0791d1012a7da01 adammetered.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 adammetered.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9DAEF1C3-CE53-4BC3-918B-B2B79E5ED177}\WpadDecisionTime = a0791d1012a7da01 adammetered.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9DAEF1C3-CE53-4BC3-918B-B2B79E5ED177}\WpadNetworkName = "Network 3" adammetered.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9DAEF1C3-CE53-4BC3-918B-B2B79E5ED177}\76-34-3a-38-f7-ef adammetered.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-34-3a-38-f7-ef\WpadDecisionReason = "1" adammetered.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix adammetered.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9DAEF1C3-CE53-4BC3-918B-B2B79E5ED177}\WpadDecisionReason = "1" adammetered.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
adammetered.exepid process 2644 adammetered.exe 2644 adammetered.exe 2644 adammetered.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
4832fcda1a71d75ea615cc30231b7a78_JaffaCakes118.exepid process 2000 4832fcda1a71d75ea615cc30231b7a78_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
4832fcda1a71d75ea615cc30231b7a78_JaffaCakes118.exeadammetered.exedescription pid process target process PID 1512 wrote to memory of 2000 1512 4832fcda1a71d75ea615cc30231b7a78_JaffaCakes118.exe 4832fcda1a71d75ea615cc30231b7a78_JaffaCakes118.exe PID 1512 wrote to memory of 2000 1512 4832fcda1a71d75ea615cc30231b7a78_JaffaCakes118.exe 4832fcda1a71d75ea615cc30231b7a78_JaffaCakes118.exe PID 1512 wrote to memory of 2000 1512 4832fcda1a71d75ea615cc30231b7a78_JaffaCakes118.exe 4832fcda1a71d75ea615cc30231b7a78_JaffaCakes118.exe PID 1512 wrote to memory of 2000 1512 4832fcda1a71d75ea615cc30231b7a78_JaffaCakes118.exe 4832fcda1a71d75ea615cc30231b7a78_JaffaCakes118.exe PID 2900 wrote to memory of 2644 2900 adammetered.exe adammetered.exe PID 2900 wrote to memory of 2644 2900 adammetered.exe adammetered.exe PID 2900 wrote to memory of 2644 2900 adammetered.exe adammetered.exe PID 2900 wrote to memory of 2644 2900 adammetered.exe adammetered.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4832fcda1a71d75ea615cc30231b7a78_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4832fcda1a71d75ea615cc30231b7a78_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\4832fcda1a71d75ea615cc30231b7a78_JaffaCakes118.exe--7a946e292⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
PID:2000
-
C:\Windows\SysWOW64\adammetered.exe"C:\Windows\SysWOW64\adammetered.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\adammetered.exe--6268a22f2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD55fdd4a8dcf5cf854ba82a0b172a76bad
SHA1067a519cdc7ff1f8d45c5669837f7863555665f3
SHA2560f8b8b85a03ac6690c9cbbfc25b92fbc25b556798feabf7b6d0a4357be82e9a0
SHA512d63c01ed9105dfbbec16cbf5f0fbf9d29960641b14b561ff056171d60614de11130e6c4f01ac29a392b8242e37b75e19b9b1e329b2b326263d23867c7e9cb225