Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 23:44
Static task
static1
Behavioral task
behavioral1
Sample
85528033b4b49155dce796e5a2b87fd4_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
85528033b4b49155dce796e5a2b87fd4_JaffaCakes118.exe
-
Size
149KB
-
MD5
85528033b4b49155dce796e5a2b87fd4
-
SHA1
73aa36a70afdfdfb6ad41f402fd056a88d1ca40d
-
SHA256
9fb655cde488d0e8fc6063a8c52d5970b6e64bd4eddcc6e0f12ecc84ee45fbe3
-
SHA512
1e26a5b9747c1aa0681b9a13d449d616df69f412f1ce3d9b63bc8896acc666937034754e3f3f08ef65f8cdfbae38aef384f91be3013dba6e3ef5b1aa7c7b5283
-
SSDEEP
3072:f8RAZ8zv28USb33t32yiJBnkfPr1tnRBv:fT8zv2ib33cBJNkfj1t7
Malware Config
Extracted
emotet
Epoch1
172.104.233.225:8080
70.32.78.99:8080
213.189.36.51:8080
107.170.27.84:443
154.120.227.206:8080
203.25.159.3:8080
80.85.87.122:8080
104.131.58.132:8080
134.209.214.126:8080
46.101.212.195:8080
190.146.131.105:8080
85.234.143.94:8080
181.135.153.203:443
182.48.194.6:8090
69.163.33.84:8080
190.38.14.52:80
88.250.223.190:8080
190.16.101.10:80
186.23.132.93:990
77.55.211.77:8080
46.41.151.103:8080
109.169.86.13:8080
68.183.190.199:8080
119.59.124.163:8080
89.188.124.145:443
185.86.148.222:8080
50.28.51.143:8080
200.58.83.179:80
200.113.106.18:80
207.154.204.40:8080
91.205.215.57:7080
5.196.35.138:7080
159.203.204.126:8080
190.4.50.26:80
201.163.74.202:443
181.198.203.45:443
77.245.101.134:8080
138.68.106.4:7080
82.196.15.205:8080
91.83.93.124:7080
139.5.237.27:443
212.71.237.140:8080
86.42.166.147:80
110.93.247.98:443
190.195.129.227:8090
190.210.184.138:995
81.169.140.14:443
186.15.83.52:8080
181.16.17.210:443
62.75.160.178:8080
186.1.41.111:443
51.15.8.192:8080
62.75.143.100:7080
181.36.42.205:443
203.130.0.69:80
149.62.173.247:8080
51.255.165.160:8080
94.183.71.206:7080
144.139.158.155:80
187.230.99.192:443
190.97.30.167:990
68.183.170.114:8080
81.213.215.216:50000
183.82.97.25:80
87.106.77.40:7080
201.213.32.59:80
92.169.250.229:8080
45.79.95.107:443
125.99.61.162:7080
14.160.93.230:80
46.28.111.142:7080
87.118.70.69:8080
170.130.31.177:8080
178.79.163.131:8080
181.61.143.177:80
91.204.163.19:8090
163.172.40.218:7080
217.199.160.224:8080
96.20.84.254:7080
142.93.114.137:8080
189.252.3.161:443
201.190.133.235:8080
181.231.62.54:80
Signatures
-
Drops file in System32 directory 4 IoCs
Processes:
wowshades.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE wowshades.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies wowshades.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 wowshades.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 wowshades.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 3 IoCs
Processes:
wowshades.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix wowshades.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" wowshades.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" wowshades.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
wowshades.exepid process 1284 wowshades.exe 1284 wowshades.exe 1284 wowshades.exe 1284 wowshades.exe 1284 wowshades.exe 1284 wowshades.exe 1284 wowshades.exe 1284 wowshades.exe 1284 wowshades.exe 1284 wowshades.exe 1284 wowshades.exe 1284 wowshades.exe 1284 wowshades.exe 1284 wowshades.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
85528033b4b49155dce796e5a2b87fd4_JaffaCakes118.exepid process 1996 85528033b4b49155dce796e5a2b87fd4_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
85528033b4b49155dce796e5a2b87fd4_JaffaCakes118.exewowshades.exedescription pid process target process PID 2700 wrote to memory of 1996 2700 85528033b4b49155dce796e5a2b87fd4_JaffaCakes118.exe 85528033b4b49155dce796e5a2b87fd4_JaffaCakes118.exe PID 2700 wrote to memory of 1996 2700 85528033b4b49155dce796e5a2b87fd4_JaffaCakes118.exe 85528033b4b49155dce796e5a2b87fd4_JaffaCakes118.exe PID 2700 wrote to memory of 1996 2700 85528033b4b49155dce796e5a2b87fd4_JaffaCakes118.exe 85528033b4b49155dce796e5a2b87fd4_JaffaCakes118.exe PID 3616 wrote to memory of 1284 3616 wowshades.exe wowshades.exe PID 3616 wrote to memory of 1284 3616 wowshades.exe wowshades.exe PID 3616 wrote to memory of 1284 3616 wowshades.exe wowshades.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\85528033b4b49155dce796e5a2b87fd4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\85528033b4b49155dce796e5a2b87fd4_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\85528033b4b49155dce796e5a2b87fd4_JaffaCakes118.exe--37c1039e2⤵
- Suspicious behavior: RenamesItself
-
C:\Windows\SysWOW64\wowshades.exe"C:\Windows\SysWOW64\wowshades.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wowshades.exe--40f64abb2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Crypto\RSA\S-1-5-18\4bd2907d2e0afb20e1193e2292377f44_a47c70d8-7adc-4ad7-994f-644a8c84c176Filesize
50B
MD5531d9bc2297289ce9b2144d0e78e77d8
SHA1e69557ab8db39ceea4557d322cab2ce8f4b61888
SHA256b4c777ec60d20aced83997482ad62fa0482734cffa67f4a5bf327f5c15d93ae0
SHA5124bd8bffea131b8b5302ffba45bf651aba71a6235bff78c08b5bad78ebe88794cba13bb6712411764b7c0e821ecca4283862dc8b243eda25f6966c3b6292df636
-
memory/1284-20-0x0000000000E50000-0x0000000000E67000-memory.dmpFilesize
92KB
-
memory/1284-25-0x0000000000E20000-0x0000000000E31000-memory.dmpFilesize
68KB
-
memory/1996-6-0x0000000000560000-0x0000000000577000-memory.dmpFilesize
92KB
-
memory/1996-11-0x0000000000540000-0x0000000000551000-memory.dmpFilesize
68KB
-
memory/1996-26-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2700-0-0x0000000002080000-0x0000000002097000-memory.dmpFilesize
92KB
-
memory/2700-5-0x00000000005E0000-0x00000000005F1000-memory.dmpFilesize
68KB
-
memory/3616-13-0x00000000005F0000-0x0000000000607000-memory.dmpFilesize
92KB
-
memory/3616-18-0x00000000005D0000-0x00000000005E1000-memory.dmpFilesize
68KB