Analysis
-
max time kernel
138s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19-05-2024 10:23
Static task
static1
Behavioral task
behavioral1
Sample
59eaa74dc01fe6c6c4abc346a4329cc4_JaffaCakes118.exe
Resource
win7-20231129-en
General
-
Target
59eaa74dc01fe6c6c4abc346a4329cc4_JaffaCakes118.exe
-
Size
616KB
-
MD5
59eaa74dc01fe6c6c4abc346a4329cc4
-
SHA1
1a221733c3bd129af88ee522f2be7e69dabbd577
-
SHA256
c31ae55b6b4a2ade8e8cd8b421e733f26e4c690f9f4937ee7b538201467193aa
-
SHA512
05020c4bea8b84ec4e1a8547901e042f84482e7690034d728842b759c86903c55584421df40f58970f455b1fba74ddfa087414fa9598dc4f2eda14adabff7e6c
-
SSDEEP
6144:KNyMUE8JKsa4OQu+/Qj/3XonIgmOUPph8HPcSpoS482U7laNytEm:AypE8JhOQu+IzYnIUUG482p
Malware Config
Extracted
emotet
Epoch2
212.186.191.177:80
91.242.138.5:80
173.13.135.102:80
59.110.18.236:443
45.56.88.91:443
51.68.220.244:8080
206.81.10.215:8080
80.11.163.139:21
182.176.132.213:8090
165.227.156.155:443
118.201.230.249:80
138.201.140.110:8080
46.105.131.87:80
87.106.139.101:8080
24.45.193.161:7080
209.97.168.52:8080
190.12.119.180:443
190.147.215.53:22
191.92.209.110:7080
91.205.215.66:8080
190.211.207.11:443
186.75.241.230:80
173.212.203.26:8080
67.225.179.64:8080
31.12.67.62:7080
128.65.154.183:443
189.209.217.49:80
107.2.2.28:80
167.99.105.223:7080
12.229.155.122:80
104.236.246.93:8080
178.209.71.63:8080
212.129.24.79:8080
95.128.43.213:8080
178.210.51.222:8080
5.88.182.250:80
91.231.166.126:8080
176.31.200.130:8080
192.81.213.192:8080
103.39.131.88:80
164.68.101.171:80
201.184.105.242:443
213.179.105.214:8080
149.202.153.252:8080
47.50.251.130:80
93.147.141.5:80
37.157.194.134:443
181.57.193.14:80
45.33.49.124:443
192.241.255.77:8080
62.75.187.192:8080
31.31.77.83:443
181.143.194.138:443
144.139.247.220:80
181.31.213.158:8080
183.102.238.69:465
206.189.112.148:8080
165.228.24.197:80
59.103.164.174:80
83.136.245.190:8080
107.170.24.125:8080
50.116.86.205:8080
197.254.221.174:80
190.108.228.48:990
104.131.11.150:8080
200.71.148.138:8080
120.150.246.241:80
217.160.182.191:8080
159.65.25.128:8080
167.114.242.226:8080
190.226.44.20:21
92.222.216.44:8080
85.104.59.244:20
101.187.247.29:80
169.239.182.217:8080
104.131.44.150:8080
192.241.220.155:8080
91.73.197.90:80
190.145.67.134:8090
116.48.142.21:443
5.196.74.210:8080
87.230.19.21:8080
211.63.71.72:8080
167.71.10.37:8080
195.244.215.206:80
190.53.135.159:21
80.21.182.46:80
78.24.219.147:8080
31.172.240.91:8080
87.106.136.232:8080
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
nicmethods.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat nicmethods.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 25 IoCs
Processes:
nicmethods.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad nicmethods.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-1b-05-84-a7-92\WpadDecision = "0" nicmethods.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" nicmethods.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" nicmethods.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E9E71E7C-1F31-456B-B5F6-6B3A05B96363} nicmethods.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings nicmethods.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections nicmethods.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix nicmethods.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings nicmethods.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" nicmethods.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 nicmethods.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0038000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 nicmethods.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E9E71E7C-1F31-456B-B5F6-6B3A05B96363}\WpadDecisionTime = 506138a5d6a9da01 nicmethods.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E9E71E7C-1F31-456B-B5F6-6B3A05B96363}\WpadDecision = "0" nicmethods.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-1b-05-84-a7-92 nicmethods.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-1b-05-84-a7-92\WpadDecisionReason = "1" nicmethods.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0038000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 nicmethods.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 nicmethods.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E9E71E7C-1F31-456B-B5F6-6B3A05B96363}\WpadDecisionReason = "1" nicmethods.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E9E71E7C-1F31-456B-B5F6-6B3A05B96363}\WpadDecisionTime = f01d46e0d6a9da01 nicmethods.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E9E71E7C-1F31-456B-B5F6-6B3A05B96363}\76-1b-05-84-a7-92 nicmethods.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-1b-05-84-a7-92\WpadDetectedUrl nicmethods.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E9E71E7C-1F31-456B-B5F6-6B3A05B96363}\WpadNetworkName = "Network 3" nicmethods.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-1b-05-84-a7-92\WpadDecisionTime = 506138a5d6a9da01 nicmethods.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-1b-05-84-a7-92\WpadDecisionTime = f01d46e0d6a9da01 nicmethods.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
nicmethods.exepid process 2896 nicmethods.exe 2896 nicmethods.exe 2896 nicmethods.exe 2896 nicmethods.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
59eaa74dc01fe6c6c4abc346a4329cc4_JaffaCakes118.exepid process 2984 59eaa74dc01fe6c6c4abc346a4329cc4_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
59eaa74dc01fe6c6c4abc346a4329cc4_JaffaCakes118.exe59eaa74dc01fe6c6c4abc346a4329cc4_JaffaCakes118.exenicmethods.exenicmethods.exepid process 1372 59eaa74dc01fe6c6c4abc346a4329cc4_JaffaCakes118.exe 2984 59eaa74dc01fe6c6c4abc346a4329cc4_JaffaCakes118.exe 2804 nicmethods.exe 2896 nicmethods.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
59eaa74dc01fe6c6c4abc346a4329cc4_JaffaCakes118.exenicmethods.exedescription pid process target process PID 1372 wrote to memory of 2984 1372 59eaa74dc01fe6c6c4abc346a4329cc4_JaffaCakes118.exe 59eaa74dc01fe6c6c4abc346a4329cc4_JaffaCakes118.exe PID 1372 wrote to memory of 2984 1372 59eaa74dc01fe6c6c4abc346a4329cc4_JaffaCakes118.exe 59eaa74dc01fe6c6c4abc346a4329cc4_JaffaCakes118.exe PID 1372 wrote to memory of 2984 1372 59eaa74dc01fe6c6c4abc346a4329cc4_JaffaCakes118.exe 59eaa74dc01fe6c6c4abc346a4329cc4_JaffaCakes118.exe PID 1372 wrote to memory of 2984 1372 59eaa74dc01fe6c6c4abc346a4329cc4_JaffaCakes118.exe 59eaa74dc01fe6c6c4abc346a4329cc4_JaffaCakes118.exe PID 2804 wrote to memory of 2896 2804 nicmethods.exe nicmethods.exe PID 2804 wrote to memory of 2896 2804 nicmethods.exe nicmethods.exe PID 2804 wrote to memory of 2896 2804 nicmethods.exe nicmethods.exe PID 2804 wrote to memory of 2896 2804 nicmethods.exe nicmethods.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\59eaa74dc01fe6c6c4abc346a4329cc4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\59eaa74dc01fe6c6c4abc346a4329cc4_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\59eaa74dc01fe6c6c4abc346a4329cc4_JaffaCakes118.exe--22149aa92⤵
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:2984
-
C:\Windows\SysWOW64\nicmethods.exe"C:\Windows\SysWOW64\nicmethods.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\nicmethods.exe--829f0a3c2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2896