Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19-05-2024 10:23
Static task
static1
Behavioral task
behavioral1
Sample
59eaa74dc01fe6c6c4abc346a4329cc4_JaffaCakes118.exe
Resource
win7-20231129-en
General
-
Target
59eaa74dc01fe6c6c4abc346a4329cc4_JaffaCakes118.exe
-
Size
616KB
-
MD5
59eaa74dc01fe6c6c4abc346a4329cc4
-
SHA1
1a221733c3bd129af88ee522f2be7e69dabbd577
-
SHA256
c31ae55b6b4a2ade8e8cd8b421e733f26e4c690f9f4937ee7b538201467193aa
-
SHA512
05020c4bea8b84ec4e1a8547901e042f84482e7690034d728842b759c86903c55584421df40f58970f455b1fba74ddfa087414fa9598dc4f2eda14adabff7e6c
-
SSDEEP
6144:KNyMUE8JKsa4OQu+/Qj/3XonIgmOUPph8HPcSpoS482U7laNytEm:AypE8JhOQu+IzYnIUUG482p
Malware Config
Extracted
emotet
Epoch2
212.186.191.177:80
91.242.138.5:80
173.13.135.102:80
59.110.18.236:443
45.56.88.91:443
51.68.220.244:8080
206.81.10.215:8080
80.11.163.139:21
182.176.132.213:8090
165.227.156.155:443
118.201.230.249:80
138.201.140.110:8080
46.105.131.87:80
87.106.139.101:8080
24.45.193.161:7080
209.97.168.52:8080
190.12.119.180:443
190.147.215.53:22
191.92.209.110:7080
91.205.215.66:8080
190.211.207.11:443
186.75.241.230:80
173.212.203.26:8080
67.225.179.64:8080
31.12.67.62:7080
128.65.154.183:443
189.209.217.49:80
107.2.2.28:80
167.99.105.223:7080
12.229.155.122:80
104.236.246.93:8080
178.209.71.63:8080
212.129.24.79:8080
95.128.43.213:8080
178.210.51.222:8080
5.88.182.250:80
91.231.166.126:8080
176.31.200.130:8080
192.81.213.192:8080
103.39.131.88:80
164.68.101.171:80
201.184.105.242:443
213.179.105.214:8080
149.202.153.252:8080
47.50.251.130:80
93.147.141.5:80
37.157.194.134:443
181.57.193.14:80
45.33.49.124:443
192.241.255.77:8080
62.75.187.192:8080
31.31.77.83:443
181.143.194.138:443
144.139.247.220:80
181.31.213.158:8080
183.102.238.69:465
206.189.112.148:8080
165.228.24.197:80
59.103.164.174:80
83.136.245.190:8080
107.170.24.125:8080
50.116.86.205:8080
197.254.221.174:80
190.108.228.48:990
104.131.11.150:8080
200.71.148.138:8080
120.150.246.241:80
217.160.182.191:8080
159.65.25.128:8080
167.114.242.226:8080
190.226.44.20:21
92.222.216.44:8080
85.104.59.244:20
101.187.247.29:80
169.239.182.217:8080
104.131.44.150:8080
192.241.220.155:8080
91.73.197.90:80
190.145.67.134:8090
116.48.142.21:443
5.196.74.210:8080
87.230.19.21:8080
211.63.71.72:8080
167.71.10.37:8080
195.244.215.206:80
190.53.135.159:21
80.21.182.46:80
78.24.219.147:8080
31.172.240.91:8080
87.106.136.232:8080
Signatures
-
Drops file in System32 directory 4 IoCs
Processes:
trnsgroup.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 trnsgroup.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE trnsgroup.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies trnsgroup.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 trnsgroup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 3 IoCs
Processes:
trnsgroup.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix trnsgroup.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" trnsgroup.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" trnsgroup.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
trnsgroup.exepid process 4412 trnsgroup.exe 4412 trnsgroup.exe 4412 trnsgroup.exe 4412 trnsgroup.exe 4412 trnsgroup.exe 4412 trnsgroup.exe 4412 trnsgroup.exe 4412 trnsgroup.exe 4412 trnsgroup.exe 4412 trnsgroup.exe 4412 trnsgroup.exe 4412 trnsgroup.exe 4412 trnsgroup.exe 4412 trnsgroup.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
59eaa74dc01fe6c6c4abc346a4329cc4_JaffaCakes118.exepid process 2832 59eaa74dc01fe6c6c4abc346a4329cc4_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
59eaa74dc01fe6c6c4abc346a4329cc4_JaffaCakes118.exe59eaa74dc01fe6c6c4abc346a4329cc4_JaffaCakes118.exetrnsgroup.exetrnsgroup.exepid process 4912 59eaa74dc01fe6c6c4abc346a4329cc4_JaffaCakes118.exe 2832 59eaa74dc01fe6c6c4abc346a4329cc4_JaffaCakes118.exe 1692 trnsgroup.exe 4412 trnsgroup.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
59eaa74dc01fe6c6c4abc346a4329cc4_JaffaCakes118.exetrnsgroup.exedescription pid process target process PID 4912 wrote to memory of 2832 4912 59eaa74dc01fe6c6c4abc346a4329cc4_JaffaCakes118.exe 59eaa74dc01fe6c6c4abc346a4329cc4_JaffaCakes118.exe PID 4912 wrote to memory of 2832 4912 59eaa74dc01fe6c6c4abc346a4329cc4_JaffaCakes118.exe 59eaa74dc01fe6c6c4abc346a4329cc4_JaffaCakes118.exe PID 4912 wrote to memory of 2832 4912 59eaa74dc01fe6c6c4abc346a4329cc4_JaffaCakes118.exe 59eaa74dc01fe6c6c4abc346a4329cc4_JaffaCakes118.exe PID 1692 wrote to memory of 4412 1692 trnsgroup.exe trnsgroup.exe PID 1692 wrote to memory of 4412 1692 trnsgroup.exe trnsgroup.exe PID 1692 wrote to memory of 4412 1692 trnsgroup.exe trnsgroup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\59eaa74dc01fe6c6c4abc346a4329cc4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\59eaa74dc01fe6c6c4abc346a4329cc4_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\59eaa74dc01fe6c6c4abc346a4329cc4_JaffaCakes118.exe--22149aa92⤵
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:2832
-
C:\Windows\SysWOW64\trnsgroup.exe"C:\Windows\SysWOW64\trnsgroup.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\trnsgroup.exe--333db8922⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Crypto\RSA\S-1-5-18\151006038beb3d5e9a4e1db2e6315db6_310807ab-751f-4d81-ae09-b202eaf21e19
Filesize50B
MD52219ed8c4461bbee47dc0ac045013700
SHA1f537ff444a352845422abf004e0087645f903a44
SHA256a2291a4fcb3343cdfad5d198bdc7dd62af09605c264681fa26ed79cecb53c01e
SHA51274026b6cb0f530e6acc0681ac68b990ca68f7baca7244b2954799b3556ee98c88f8d63092863cd391d1851b6e10795f54252da34a5d25da3911779891f8cb822