Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
19-05-2024 09:58
Static task
static1
Behavioral task
behavioral1
Sample
59d10dab0637b1608a97f3e36899082e_JaffaCakes118.exe
Resource
win7-20240419-en
General
-
Target
59d10dab0637b1608a97f3e36899082e_JaffaCakes118.exe
-
Size
312KB
-
MD5
59d10dab0637b1608a97f3e36899082e
-
SHA1
9c8deca1189a84a8ca59d3f71da352b9f3488f2a
-
SHA256
9dd242fda4f305662555852b45cee283b3e338207a18263c0004cb111d57766c
-
SHA512
40cbd2c40601b4c6b3f4eeea2dd4e6880bc68ddc28ed0e097776127319451a7712e478c1f79825867f10a2e727e2fba5482cce609f7bcb13cb1391ea9789b38b
-
SSDEEP
6144:Bph2KiYC3aZBTVItzt3QlpLV0IjLKdJr2qKiTstk:BViYC3aZU53QuIjLKdwGge
Malware Config
Extracted
emotet
Epoch1
68.187.160.28:443
97.120.32.227:80
187.188.166.192:8080
144.217.117.207:8080
96.126.121.64:443
104.236.137.72:8080
85.234.143.94:8080
68.174.15.223:80
63.246.252.234:80
93.148.252.90:80
74.59.187.94:80
185.160.212.3:80
46.28.111.142:7080
183.99.239.141:80
68.129.203.162:443
144.139.56.105:80
191.183.21.190:80
81.157.234.90:8080
138.68.106.4:7080
203.130.0.69:80
181.36.42.205:443
190.97.30.167:990
94.200.114.162:80
149.62.173.247:8080
188.216.24.204:80
85.152.208.146:80
116.48.138.115:80
50.28.51.143:8080
190.210.184.138:995
83.165.78.227:80
68.183.170.114:8080
186.15.83.52:8080
93.67.154.252:443
74.79.103.55:80
152.170.108.99:443
111.125.71.22:8080
68.183.190.199:8080
93.144.226.57:80
82.8.232.51:80
37.187.6.63:8080
200.58.83.179:80
217.199.160.224:8080
86.42.166.147:80
91.74.175.46:80
97.81.12.153:80
125.99.61.162:7080
207.154.204.40:8080
14.160.93.230:80
87.106.77.40:7080
109.169.86.13:8080
91.205.215.57:7080
82.196.15.205:8080
96.61.113.203:80
181.198.203.45:443
130.204.247.253:80
5.88.27.67:8080
82.36.103.14:80
2.45.112.134:80
190.6.193.152:8080
63.248.198.8:80
51.255.165.160:8080
189.19.81.181:443
186.68.48.204:443
2.44.167.52:80
163.172.40.218:7080
201.213.32.59:80
151.237.36.220:80
77.55.211.77:8080
37.183.121.32:80
112.218.134.227:80
77.27.221.24:443
190.186.164.23:80
175.114.178.83:443
45.50.177.164:80
87.106.46.107:8080
91.204.163.19:8090
188.135.15.49:80
190.195.129.227:8090
159.203.204.126:8080
104.131.58.132:8080
185.86.148.222:8080
46.101.212.195:8080
223.255.148.134:80
79.7.114.1:80
80.11.158.65:8080
190.100.153.162:443
203.25.159.3:8080
2.139.158.136:443
72.29.55.174:80
73.60.8.210:80
37.211.49.127:80
212.71.237.140:8080
5.196.35.138:7080
185.160.229.26:80
91.83.93.124:7080
69.163.33.84:8080
45.8.136.201:80
83.248.141.198:80
200.119.11.118:443
219.75.66.103:80
118.36.70.245:80
192.241.146.84:8080
45.79.95.107:443
116.48.148.32:80
62.75.160.178:8080
142.127.57.63:8080
62.75.143.100:7080
119.59.124.163:8080
181.61.143.177:80
200.124.225.32:80
5.32.41.106:80
37.120.185.153:443
96.38.234.10:80
110.170.65.146:80
190.146.131.105:8080
2.42.173.240:80
191.103.76.34:443
91.117.83.59:80
58.171.38.26:80
178.79.163.131:8080
113.61.76.239:80
99.252.27.6:80
139.162.118.88:8080
165.228.195.93:80
212.237.50.61:8080
142.93.114.137:8080
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
deployspeed.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat deployspeed.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 21 IoCs
Processes:
deployspeed.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" deployspeed.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" deployspeed.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" deployspeed.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad deployspeed.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{10A52142-7252-451C-97D7-325E0A5C3C76}\WpadDecision = "0" deployspeed.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{10A52142-7252-451C-97D7-325E0A5C3C76}\WpadNetworkName = "Network 3" deployspeed.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings deployspeed.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings deployspeed.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{10A52142-7252-451C-97D7-325E0A5C3C76} deployspeed.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\86-8f-56-e4-0d-35\WpadDecisionTime = 206ce827d3a9da01 deployspeed.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections deployspeed.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 deployspeed.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{10A52142-7252-451C-97D7-325E0A5C3C76}\WpadDecisionReason = "1" deployspeed.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{10A52142-7252-451C-97D7-325E0A5C3C76}\86-8f-56-e4-0d-35 deployspeed.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 deployspeed.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix deployspeed.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00cc000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 deployspeed.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{10A52142-7252-451C-97D7-325E0A5C3C76}\WpadDecisionTime = 206ce827d3a9da01 deployspeed.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\86-8f-56-e4-0d-35 deployspeed.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\86-8f-56-e4-0d-35\WpadDecisionReason = "1" deployspeed.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\86-8f-56-e4-0d-35\WpadDecision = "0" deployspeed.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
deployspeed.exepid process 2740 deployspeed.exe 2740 deployspeed.exe 2740 deployspeed.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
59d10dab0637b1608a97f3e36899082e_JaffaCakes118.exepid process 2860 59d10dab0637b1608a97f3e36899082e_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
59d10dab0637b1608a97f3e36899082e_JaffaCakes118.exe59d10dab0637b1608a97f3e36899082e_JaffaCakes118.exedeployspeed.exedeployspeed.exepid process 1860 59d10dab0637b1608a97f3e36899082e_JaffaCakes118.exe 1860 59d10dab0637b1608a97f3e36899082e_JaffaCakes118.exe 2860 59d10dab0637b1608a97f3e36899082e_JaffaCakes118.exe 2860 59d10dab0637b1608a97f3e36899082e_JaffaCakes118.exe 2656 deployspeed.exe 2656 deployspeed.exe 2740 deployspeed.exe 2740 deployspeed.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
59d10dab0637b1608a97f3e36899082e_JaffaCakes118.exedeployspeed.exedescription pid process target process PID 1860 wrote to memory of 2860 1860 59d10dab0637b1608a97f3e36899082e_JaffaCakes118.exe 59d10dab0637b1608a97f3e36899082e_JaffaCakes118.exe PID 1860 wrote to memory of 2860 1860 59d10dab0637b1608a97f3e36899082e_JaffaCakes118.exe 59d10dab0637b1608a97f3e36899082e_JaffaCakes118.exe PID 1860 wrote to memory of 2860 1860 59d10dab0637b1608a97f3e36899082e_JaffaCakes118.exe 59d10dab0637b1608a97f3e36899082e_JaffaCakes118.exe PID 1860 wrote to memory of 2860 1860 59d10dab0637b1608a97f3e36899082e_JaffaCakes118.exe 59d10dab0637b1608a97f3e36899082e_JaffaCakes118.exe PID 2656 wrote to memory of 2740 2656 deployspeed.exe deployspeed.exe PID 2656 wrote to memory of 2740 2656 deployspeed.exe deployspeed.exe PID 2656 wrote to memory of 2740 2656 deployspeed.exe deployspeed.exe PID 2656 wrote to memory of 2740 2656 deployspeed.exe deployspeed.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\59d10dab0637b1608a97f3e36899082e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\59d10dab0637b1608a97f3e36899082e_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\59d10dab0637b1608a97f3e36899082e_JaffaCakes118.exe--25db4f642⤵
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:2860
-
C:\Windows\SysWOW64\deployspeed.exe"C:\Windows\SysWOW64\deployspeed.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\deployspeed.exe--ac917bd62⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2740