Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
30-05-2024 04:08
Static task
static1
Behavioral task
behavioral1
Sample
82fcee092b605521ad84765368975204_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
82fcee092b605521ad84765368975204_JaffaCakes118.exe
-
Size
240KB
-
MD5
82fcee092b605521ad84765368975204
-
SHA1
6c6247c06c4924bb6a3a0745551a622948fdb35e
-
SHA256
6f0c43533bca3f99699a76fcdce14e7a87290aa035e8da9180ffcfb483810e78
-
SHA512
8dc9755d7d81f9c14c3a5abafc38f3bc405940ca6ee94ed48a0bed1c6bdb46056f004f4a728ad333afbab1bc030cad59e1bc83a6b41a87477db65cc437865897
-
SSDEEP
6144:s7lDAB0NEKts6sUnmWpe6vTgJQ/5867T3EovpVAN9DaYVEuBOCBuWNmT2KIZOi7e:0l0B0WKtsnWprTV
Malware Config
Extracted
emotet
Epoch1
190.217.1.149:80
154.120.227.206:8080
45.56.79.249:443
163.172.40.218:7080
79.143.182.254:8080
190.230.60.129:8080
46.28.111.142:7080
190.182.161.7:8080
186.68.141.218:80
201.163.74.202:443
62.75.143.100:7080
200.57.102.71:8443
41.75.135.93:7080
119.159.150.176:443
46.41.151.103:8080
178.79.163.131:8080
190.10.194.42:8080
104.131.58.132:8080
200.113.106.18:80
186.15.57.7:8080
220.241.38.226:50000
77.245.101.134:8080
82.196.15.205:8080
190.96.118.15:443
207.154.204.40:8080
190.104.253.234:990
181.36.42.205:443
190.120.104.21:443
201.184.41.228:990
181.44.166.242:80
183.82.97.25:80
212.71.237.140:8080
190.146.131.105:8080
201.213.32.59:80
200.30.227.135:80
178.249.187.151:8080
94.183.71.206:7080
217.199.160.224:8080
91.205.215.57:7080
190.230.60.129:80
139.5.237.27:443
91.204.163.19:8090
51.15.8.192:8080
94.177.183.28:8080
86.42.166.147:80
144.139.158.155:80
181.59.253.20:21
77.55.211.77:8080
142.93.114.137:8080
190.97.30.167:990
62.75.160.178:8080
80.85.87.122:8080
109.169.86.13:8080
190.38.14.52:80
186.1.41.111:443
138.68.106.4:7080
186.0.95.172:80
45.79.95.107:443
119.59.124.163:8080
68.183.170.114:8080
181.16.17.210:443
14.160.93.230:80
159.203.204.126:8080
201.190.133.235:8080
86.6.188.121:80
46.101.212.195:8080
87.106.77.40:7080
149.62.173.247:8080
89.188.124.145:443
186.23.132.93:990
181.135.153.203:443
69.163.33.84:8080
200.58.83.179:80
185.86.148.222:8080
185.187.198.10:8080
79.127.57.43:80
91.83.93.124:7080
46.29.183.211:8080
50.28.51.143:8080
5.196.35.138:7080
81.169.140.14:443
203.25.159.3:8080
190.85.152.186:8080
68.183.190.199:8080
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
cableetw.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat cableetw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 21 IoCs
Processes:
cableetw.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BBA010D1-6925-4011-A9BE-2F3BBC9AB011}\52-a4-6c-d2-f4-72 cableetw.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix cableetw.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" cableetw.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0026000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 cableetw.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BBA010D1-6925-4011-A9BE-2F3BBC9AB011}\WpadDecisionReason = "1" cableetw.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BBA010D1-6925-4011-A9BE-2F3BBC9AB011}\WpadDecision = "0" cableetw.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BBA010D1-6925-4011-A9BE-2F3BBC9AB011}\WpadNetworkName = "Network 3" cableetw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-a4-6c-d2-f4-72 cableetw.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-a4-6c-d2-f4-72\WpadDecisionReason = "1" cableetw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections cableetw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings cableetw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings cableetw.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 cableetw.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" cableetw.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" cableetw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BBA010D1-6925-4011-A9BE-2F3BBC9AB011} cableetw.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BBA010D1-6925-4011-A9BE-2F3BBC9AB011}\WpadDecisionTime = 50104b1547b2da01 cableetw.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-a4-6c-d2-f4-72\WpadDecision = "0" cableetw.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 cableetw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad cableetw.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-a4-6c-d2-f4-72\WpadDecisionTime = 50104b1547b2da01 cableetw.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
cableetw.exepid process 2828 cableetw.exe 2828 cableetw.exe 2828 cableetw.exe 2828 cableetw.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
82fcee092b605521ad84765368975204_JaffaCakes118.exepid process 2960 82fcee092b605521ad84765368975204_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
82fcee092b605521ad84765368975204_JaffaCakes118.execableetw.exedescription pid process target process PID 2284 wrote to memory of 2960 2284 82fcee092b605521ad84765368975204_JaffaCakes118.exe 82fcee092b605521ad84765368975204_JaffaCakes118.exe PID 2284 wrote to memory of 2960 2284 82fcee092b605521ad84765368975204_JaffaCakes118.exe 82fcee092b605521ad84765368975204_JaffaCakes118.exe PID 2284 wrote to memory of 2960 2284 82fcee092b605521ad84765368975204_JaffaCakes118.exe 82fcee092b605521ad84765368975204_JaffaCakes118.exe PID 2284 wrote to memory of 2960 2284 82fcee092b605521ad84765368975204_JaffaCakes118.exe 82fcee092b605521ad84765368975204_JaffaCakes118.exe PID 2640 wrote to memory of 2828 2640 cableetw.exe cableetw.exe PID 2640 wrote to memory of 2828 2640 cableetw.exe cableetw.exe PID 2640 wrote to memory of 2828 2640 cableetw.exe cableetw.exe PID 2640 wrote to memory of 2828 2640 cableetw.exe cableetw.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\82fcee092b605521ad84765368975204_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\82fcee092b605521ad84765368975204_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\82fcee092b605521ad84765368975204_JaffaCakes118.exe--b4d2a7f22⤵
- Suspicious behavior: RenamesItself
PID:2960
-
-
C:\Windows\SysWOW64\cableetw.exe"C:\Windows\SysWOW64\cableetw.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\cableetw.exe--bd7c679d2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2828
-