Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 20:34
Static task
static1
Behavioral task
behavioral1
Sample
56a74a8908b0828cfbe2fc3fe31370b5_JaffaCakes118.exe
Resource
win7-20231129-en
General
-
Target
56a74a8908b0828cfbe2fc3fe31370b5_JaffaCakes118.exe
-
Size
150KB
-
MD5
56a74a8908b0828cfbe2fc3fe31370b5
-
SHA1
c3406c91d8ac0c51b8c355eaffe78b5c631e2f23
-
SHA256
df159e1c84b06cf4634f46a45f88bcce5b42eda62066d5281f0102d75e69c83f
-
SHA512
8b22efe067e1479e53573e2ed62cf047877e78e11b7a3dcfb5fd7713da45672c6694971adc9859d008abc9d55d15ac721b2d95df6524a0234e99783d38005ebc
-
SSDEEP
3072:UxncMgH2URcG0yBaoqBuBhh6U74AZeH4vwt1UgCojoo:Ulc7H2U2iaoqBihh175FSUgCojoo
Malware Config
Extracted
emotet
Epoch1
189.173.113.67:443
200.123.101.90:80
170.130.31.177:8080
51.255.165.160:8080
45.56.79.249:443
185.86.148.222:8080
190.4.50.26:80
187.188.166.192:80
94.177.183.28:8080
201.213.32.59:80
76.69.29.42:80
190.96.118.15:443
81.213.215.216:50000
80.85.87.122:8080
186.1.41.111:443
183.82.97.25:80
220.241.38.226:50000
14.160.93.230:80
200.58.83.179:80
138.68.106.4:7080
77.245.101.134:8080
178.79.163.131:8080
200.113.106.18:80
181.16.17.210:443
190.146.131.105:8080
51.15.8.192:8080
45.79.95.107:443
79.127.57.43:80
88.250.223.190:8080
62.75.160.178:8080
46.101.212.195:8080
190.182.161.7:8080
77.55.211.77:8080
217.199.160.224:8080
163.172.40.218:7080
68.183.190.199:8080
212.71.237.140:8080
201.163.74.202:443
201.190.133.235:8080
91.83.93.124:7080
89.188.124.145:443
181.135.153.203:443
46.29.183.211:8080
94.183.71.206:7080
190.79.228.89:443
203.25.159.3:8080
207.154.204.40:8080
68.183.170.114:8080
139.5.237.27:443
62.75.143.100:7080
154.120.227.206:8080
144.139.158.155:80
109.169.86.13:8080
60.52.64.122:80
87.106.77.40:7080
142.93.114.137:8080
42.190.4.92:443
119.59.124.163:8080
82.196.15.205:8080
149.62.173.247:8080
46.28.111.142:7080
79.143.182.254:8080
190.38.14.52:80
81.169.140.14:443
46.41.151.103:8080
111.119.233.65:80
5.196.35.138:7080
69.163.33.84:8080
187.131.128.238:50000
86.42.166.147:80
178.249.187.151:8080
159.203.204.126:8080
41.75.135.93:7080
91.205.215.57:7080
186.23.132.93:990
50.28.51.143:8080
190.97.30.167:990
91.204.163.19:8090
104.131.58.132:8080
190.210.184.138:995
Signatures
-
Drops file in System32 directory 4 IoCs
Processes:
navtimeout.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE navtimeout.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies navtimeout.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 navtimeout.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 navtimeout.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 3 IoCs
Processes:
navtimeout.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix navtimeout.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" navtimeout.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" navtimeout.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
navtimeout.exepid process 4632 navtimeout.exe 4632 navtimeout.exe 4632 navtimeout.exe 4632 navtimeout.exe 4632 navtimeout.exe 4632 navtimeout.exe 4632 navtimeout.exe 4632 navtimeout.exe 4632 navtimeout.exe 4632 navtimeout.exe 4632 navtimeout.exe 4632 navtimeout.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
56a74a8908b0828cfbe2fc3fe31370b5_JaffaCakes118.exepid process 4916 56a74a8908b0828cfbe2fc3fe31370b5_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
56a74a8908b0828cfbe2fc3fe31370b5_JaffaCakes118.exenavtimeout.exedescription pid process target process PID 5116 wrote to memory of 4916 5116 56a74a8908b0828cfbe2fc3fe31370b5_JaffaCakes118.exe 56a74a8908b0828cfbe2fc3fe31370b5_JaffaCakes118.exe PID 5116 wrote to memory of 4916 5116 56a74a8908b0828cfbe2fc3fe31370b5_JaffaCakes118.exe 56a74a8908b0828cfbe2fc3fe31370b5_JaffaCakes118.exe PID 5116 wrote to memory of 4916 5116 56a74a8908b0828cfbe2fc3fe31370b5_JaffaCakes118.exe 56a74a8908b0828cfbe2fc3fe31370b5_JaffaCakes118.exe PID 3980 wrote to memory of 4632 3980 navtimeout.exe navtimeout.exe PID 3980 wrote to memory of 4632 3980 navtimeout.exe navtimeout.exe PID 3980 wrote to memory of 4632 3980 navtimeout.exe navtimeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\56a74a8908b0828cfbe2fc3fe31370b5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\56a74a8908b0828cfbe2fc3fe31370b5_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\56a74a8908b0828cfbe2fc3fe31370b5_JaffaCakes118.exe--7cbcba612⤵
- Suspicious behavior: RenamesItself
PID:4916
-
C:\Windows\SysWOW64\navtimeout.exe"C:\Windows\SysWOW64\navtimeout.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Windows\SysWOW64\navtimeout.exe--b8e83ad02⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Crypto\RSA\S-1-5-18\5ee9f8cddb3ff188c6a99dcf99203008_41e50f4a-4a76-42e1-a3df-51306e426307
Filesize50B
MD5aaec799e344163d0d188e0590697cb1e
SHA194aa3e9674f1335e1cdf6dc7b7c7cdbf5c97c65d
SHA256d627b40c75603106e24782fdb852c180722ae6d472bdb60367bf2708f28f5454
SHA512285e78b5ddc3049b2b167e0c785f410260eecdbb745489e3e5984e118c627e97b7499f8a937a4a6d5da4fe046fb220fc70fd5abc583083909fd005b1ee4f03b0