Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 11:10
Static task
static1
Behavioral task
behavioral1
Sample
631545bb910def12263fbd08ad675d6e_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
631545bb910def12263fbd08ad675d6e_JaffaCakes118.exe
-
Size
551KB
-
MD5
631545bb910def12263fbd08ad675d6e
-
SHA1
685fe2a44c4d2d803ec605b1e03ddec3e65e2a19
-
SHA256
2091a24d7e03980bcd3f18b5a71ca87a93e4f4382810de2ad817086c626d3505
-
SHA512
fb38ac528a5f53ccb2dde9310f6166a5560e2d4089f2106f48983a49efa9b2ae6574f5385f238aa08b9355a5180004548b210a2459d6b191185b4b0cd7b7fe9e
-
SSDEEP
12288:JjVeneMEuEB2ZVirlydPUGUuhshCK+NeFxAri6If0LecJDFqs:VcneFJB2irl6UuhzK+NeFxAri6IfmJJq
Malware Config
Extracted
emotet
Epoch1
111.119.233.65:80
190.210.184.138:995
51.255.165.160:8080
45.56.79.249:443
163.172.40.218:7080
91.205.215.57:7080
68.183.170.114:8080
190.217.1.149:80
62.75.160.178:8080
200.113.106.18:80
5.196.35.138:7080
89.188.124.145:443
186.23.132.93:990
51.15.8.192:8080
190.38.14.52:80
217.199.160.224:8080
207.154.204.40:8080
142.93.114.137:8080
94.183.71.206:7080
190.104.253.234:990
212.71.237.140:8080
201.163.74.202:443
201.190.133.235:8080
186.15.57.7:8080
86.42.166.147:80
82.196.15.205:8080
186.68.141.218:80
46.28.111.142:7080
138.68.106.4:7080
190.10.194.42:8080
104.131.58.132:8080
190.96.118.15:443
190.230.60.129:80
109.169.86.13:8080
181.44.166.242:80
46.41.151.103:8080
144.139.158.155:80
183.82.97.25:80
149.62.173.247:8080
81.169.140.14:443
159.203.204.126:8080
77.245.101.134:8080
46.29.183.211:8080
68.183.190.199:8080
220.241.38.226:50000
45.79.95.107:443
200.58.83.179:80
190.97.30.167:990
178.79.163.131:8080
190.120.104.21:443
77.55.211.77:8080
201.213.32.59:80
79.143.182.254:8080
14.160.93.230:80
178.249.187.151:8080
190.182.161.7:8080
181.59.253.20:21
139.5.237.27:443
154.120.227.206:8080
91.83.93.124:7080
181.16.17.210:443
80.85.87.122:8080
119.59.124.163:8080
190.230.60.129:8080
181.135.153.203:443
185.86.148.222:8080
46.101.212.195:8080
201.184.41.228:990
50.28.51.143:8080
86.6.188.121:80
62.75.143.100:7080
81.213.215.216:50000
181.36.42.205:443
186.1.41.111:443
203.25.159.3:8080
79.127.57.43:80
69.163.33.84:8080
41.75.135.93:7080
190.146.131.105:8080
87.106.77.40:7080
91.204.163.19:8090
94.177.183.28:8080
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
builderconman.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat builderconman.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 21 IoCs
Processes:
builderconman.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" builderconman.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 builderconman.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\42-35-df-dc-3d-6b\WpadDecisionReason = "1" builderconman.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings builderconman.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" builderconman.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f007a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 builderconman.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6DEFC3CB-1B7E-4923-BBD6-B2FEC944D511}\WpadNetworkName = "Network 3" builderconman.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\42-35-df-dc-3d-6b builderconman.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix builderconman.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings builderconman.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" builderconman.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad builderconman.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6DEFC3CB-1B7E-4923-BBD6-B2FEC944D511}\WpadDecision = "0" builderconman.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6DEFC3CB-1B7E-4923-BBD6-B2FEC944D511}\42-35-df-dc-3d-6b builderconman.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\42-35-df-dc-3d-6b\WpadDecision = "0" builderconman.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections builderconman.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6DEFC3CB-1B7E-4923-BBD6-B2FEC944D511} builderconman.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6DEFC3CB-1B7E-4923-BBD6-B2FEC944D511}\WpadDecisionReason = "1" builderconman.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6DEFC3CB-1B7E-4923-BBD6-B2FEC944D511}\WpadDecisionTime = 20e12d936fabda01 builderconman.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\42-35-df-dc-3d-6b\WpadDecisionTime = 20e12d936fabda01 builderconman.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 builderconman.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
builderconman.exepid process 2612 builderconman.exe 2612 builderconman.exe 2612 builderconman.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
631545bb910def12263fbd08ad675d6e_JaffaCakes118.exepid process 1876 631545bb910def12263fbd08ad675d6e_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
631545bb910def12263fbd08ad675d6e_JaffaCakes118.exe631545bb910def12263fbd08ad675d6e_JaffaCakes118.exebuilderconman.exebuilderconman.exepid process 2256 631545bb910def12263fbd08ad675d6e_JaffaCakes118.exe 2256 631545bb910def12263fbd08ad675d6e_JaffaCakes118.exe 1876 631545bb910def12263fbd08ad675d6e_JaffaCakes118.exe 1876 631545bb910def12263fbd08ad675d6e_JaffaCakes118.exe 2528 builderconman.exe 2528 builderconman.exe 2612 builderconman.exe 2612 builderconman.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
631545bb910def12263fbd08ad675d6e_JaffaCakes118.exebuilderconman.exedescription pid process target process PID 2256 wrote to memory of 1876 2256 631545bb910def12263fbd08ad675d6e_JaffaCakes118.exe 631545bb910def12263fbd08ad675d6e_JaffaCakes118.exe PID 2256 wrote to memory of 1876 2256 631545bb910def12263fbd08ad675d6e_JaffaCakes118.exe 631545bb910def12263fbd08ad675d6e_JaffaCakes118.exe PID 2256 wrote to memory of 1876 2256 631545bb910def12263fbd08ad675d6e_JaffaCakes118.exe 631545bb910def12263fbd08ad675d6e_JaffaCakes118.exe PID 2256 wrote to memory of 1876 2256 631545bb910def12263fbd08ad675d6e_JaffaCakes118.exe 631545bb910def12263fbd08ad675d6e_JaffaCakes118.exe PID 2528 wrote to memory of 2612 2528 builderconman.exe builderconman.exe PID 2528 wrote to memory of 2612 2528 builderconman.exe builderconman.exe PID 2528 wrote to memory of 2612 2528 builderconman.exe builderconman.exe PID 2528 wrote to memory of 2612 2528 builderconman.exe builderconman.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\631545bb910def12263fbd08ad675d6e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\631545bb910def12263fbd08ad675d6e_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\631545bb910def12263fbd08ad675d6e_JaffaCakes118.exe--1971609f2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:1876
-
-
C:\Windows\SysWOW64\builderconman.exe"C:\Windows\SysWOW64\builderconman.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\builderconman.exe--1b0fa8292⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2612
-