Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 19:37
Static task
static1
Behavioral task
behavioral1
Sample
7a46ae6300ee36b083ed09468f18adf2_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
7a46ae6300ee36b083ed09468f18adf2_JaffaCakes118.exe
-
Size
320KB
-
MD5
7a46ae6300ee36b083ed09468f18adf2
-
SHA1
cbc78190fe2389c3b7a4d7701de3074e6cb6e236
-
SHA256
886d04147c42accc7fed45ce59779d58adbd23f0c527615e796a142d4c3cd610
-
SHA512
e40ab9cde168c79e6c55f97161673a4ef93e197718e2a1969468810078be090f61ac62313400751723b4b6ddbcde770981f4bc9932009e58f103f9722110cf6e
-
SSDEEP
6144:0eTNh1u2yP0fI6QRcHdFn2yWBA53u3Phhg+dLb9VzOmhy:00Nh1u0A6QkF2pBs3uJu+dH9UIy
Malware Config
Extracted
emotet
Epoch1
74.79.103.55:80
190.100.153.162:443
190.6.193.152:8080
96.126.121.64:443
104.236.137.72:8080
85.234.143.94:8080
80.85.87.122:8080
62.75.160.178:8080
71.76.45.83:443
14.160.93.230:80
87.106.77.40:7080
149.135.123.65:80
76.221.133.146:80
46.101.212.195:8080
91.83.93.124:7080
45.8.136.201:80
201.213.32.59:80
2.139.158.136:443
152.170.108.99:443
188.14.39.65:443
190.97.30.167:990
96.38.234.10:80
97.81.12.153:80
72.29.55.174:80
91.117.83.59:80
181.61.143.177:80
91.74.175.46:80
24.100.130.206:80
80.103.207.62:8080
94.200.114.162:80
2.44.167.52:80
68.129.203.162:443
37.183.121.32:80
68.183.170.114:8080
69.163.33.84:8080
46.28.111.142:7080
82.36.103.14:80
181.36.42.205:443
45.50.177.164:80
207.154.204.40:8080
190.186.164.23:80
138.68.106.4:7080
204.63.252.182:443
183.99.239.141:80
51.255.165.160:8080
5.32.41.106:80
217.199.160.224:8080
111.125.71.22:8080
116.48.148.32:80
191.103.76.34:443
188.135.15.49:80
212.71.237.140:8080
190.210.184.138:995
91.205.215.57:7080
79.7.114.1:80
159.203.204.126:8080
99.252.27.6:80
203.25.159.3:8080
2.42.173.240:80
119.59.124.163:8080
203.130.0.69:80
50.28.51.143:8080
200.123.101.90:80
118.36.70.245:80
184.184.202.167:443
5.196.35.138:7080
88.147.21.248:80
149.62.173.247:8080
223.255.148.134:80
73.167.135.180:80
63.246.252.234:80
81.157.234.90:8080
163.172.40.218:7080
181.231.62.54:80
74.59.187.94:80
112.218.134.227:80
188.216.24.204:80
200.119.11.118:443
37.120.185.153:443
91.204.163.19:8090
178.79.163.131:8080
125.99.61.162:7080
139.162.118.88:8080
109.169.86.13:8080
113.61.76.239:80
181.198.203.45:443
85.152.208.146:80
200.58.83.179:80
142.93.114.137:8080
82.196.15.205:8080
77.55.211.77:8080
45.79.95.107:443
104.131.58.132:8080
5.88.27.67:8080
142.127.57.63:8080
185.160.212.3:80
82.8.232.51:80
186.68.48.204:443
118.200.218.193:443
80.11.158.65:8080
212.237.50.61:8080
73.60.8.210:80
68.174.15.223:80
219.75.66.103:80
192.241.146.84:8080
86.42.166.147:80
96.61.113.203:80
93.67.154.252:443
186.15.83.52:8080
190.146.131.105:8080
116.48.138.115:80
87.106.46.107:8080
185.86.148.222:8080
181.135.153.203:443
190.195.129.227:8090
93.148.252.90:80
62.75.143.100:7080
200.124.225.32:80
144.139.56.105:80
68.183.190.199:8080
Signatures
-
Drops file in System32 directory 4 IoCs
Processes:
grouphant.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 grouphant.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE grouphant.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies grouphant.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 grouphant.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 3 IoCs
Processes:
grouphant.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix grouphant.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" grouphant.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" grouphant.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
grouphant.exepid process 2800 grouphant.exe 2800 grouphant.exe 2800 grouphant.exe 2800 grouphant.exe 2800 grouphant.exe 2800 grouphant.exe 2800 grouphant.exe 2800 grouphant.exe 2800 grouphant.exe 2800 grouphant.exe 2800 grouphant.exe 2800 grouphant.exe 2800 grouphant.exe 2800 grouphant.exe 2800 grouphant.exe 2800 grouphant.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
7a46ae6300ee36b083ed09468f18adf2_JaffaCakes118.exepid process 3240 7a46ae6300ee36b083ed09468f18adf2_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
7a46ae6300ee36b083ed09468f18adf2_JaffaCakes118.exe7a46ae6300ee36b083ed09468f18adf2_JaffaCakes118.exegrouphant.exegrouphant.exepid process 3600 7a46ae6300ee36b083ed09468f18adf2_JaffaCakes118.exe 3240 7a46ae6300ee36b083ed09468f18adf2_JaffaCakes118.exe 2484 grouphant.exe 2800 grouphant.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
7a46ae6300ee36b083ed09468f18adf2_JaffaCakes118.exegrouphant.exedescription pid process target process PID 3600 wrote to memory of 3240 3600 7a46ae6300ee36b083ed09468f18adf2_JaffaCakes118.exe 7a46ae6300ee36b083ed09468f18adf2_JaffaCakes118.exe PID 3600 wrote to memory of 3240 3600 7a46ae6300ee36b083ed09468f18adf2_JaffaCakes118.exe 7a46ae6300ee36b083ed09468f18adf2_JaffaCakes118.exe PID 3600 wrote to memory of 3240 3600 7a46ae6300ee36b083ed09468f18adf2_JaffaCakes118.exe 7a46ae6300ee36b083ed09468f18adf2_JaffaCakes118.exe PID 2484 wrote to memory of 2800 2484 grouphant.exe grouphant.exe PID 2484 wrote to memory of 2800 2484 grouphant.exe grouphant.exe PID 2484 wrote to memory of 2800 2484 grouphant.exe grouphant.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a46ae6300ee36b083ed09468f18adf2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7a46ae6300ee36b083ed09468f18adf2_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\7a46ae6300ee36b083ed09468f18adf2_JaffaCakes118.exe--9e47b532⤵
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:3240
-
-
C:\Windows\SysWOW64\grouphant.exe"C:\Windows\SysWOW64\grouphant.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\grouphant.exe--64f316542⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2800
-