Malware Analysis Report

2024-09-22 22:40

Sample ID 240605-pm99rsgb57
Target 98292ead4d99d7ea433b0a0660ceb2f0_JaffaCakes118
SHA256 2564d5cf90c410e244f0e48b2114c79a30dfd862574831d5f6a66a2f7dbc7494
Tags
emotet epoch1 banker trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

2564d5cf90c410e244f0e48b2114c79a30dfd862574831d5f6a66a2f7dbc7494

Threat Level: Known bad

The file 98292ead4d99d7ea433b0a0660ceb2f0_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

emotet epoch1 banker trojan

Emotet

Drops file in System32 directory

Enumerates physical storage devices

Unsigned PE

Modifies data under HKEY_USERS

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: RenamesItself

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-05 12:27

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-05 12:27

Reported

2024-06-05 12:36

Platform

win7-20231129-en

Max time kernel

150s

Max time network

154s

Command Line

"C:\Users\Admin\AppData\Local\Temp\98292ead4d99d7ea433b0a0660ceb2f0_JaffaCakes118.exe"

Signatures

Emotet

trojan banker emotet

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat C:\Windows\SysWOW64\printschunker.exe N/A

Enumerates physical storage devices

Modifies data under HKEY_USERS

Description Indicator Process Target
Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{DC5DC725-7EE4-4106-A354-37B58A2E741F}\WpadDecisionReason = "1" C:\Windows\SysWOW64\printschunker.exe N/A
Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{DC5DC725-7EE4-4106-A354-37B58A2E741F}\WpadDecisionTime = 405510dc44b7da01 C:\Windows\SysWOW64\printschunker.exe N/A
Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{DC5DC725-7EE4-4106-A354-37B58A2E741F}\96-17-9c-c4-2a-e2 C:\Windows\SysWOW64\printschunker.exe N/A
Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0051000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 C:\Windows\SysWOW64\printschunker.exe N/A
Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-17-9c-c4-2a-e2\WpadDecisionTime = 405510dc44b7da01 C:\Windows\SysWOW64\printschunker.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections C:\Windows\SysWOW64\printschunker.exe N/A
Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0051000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 C:\Windows\SysWOW64\printschunker.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{DC5DC725-7EE4-4106-A354-37B58A2E741F}\WpadNetworkName = "Network 3" C:\Windows\SysWOW64\printschunker.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" C:\Windows\SysWOW64\printschunker.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-17-9c-c4-2a-e2\WpadDetectedUrl C:\Windows\SysWOW64\printschunker.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings C:\Windows\SysWOW64\printschunker.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix C:\Windows\SysWOW64\printschunker.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" C:\Windows\SysWOW64\printschunker.exe N/A
Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 C:\Windows\SysWOW64\printschunker.exe N/A
Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings C:\Windows\SysWOW64\printschunker.exe N/A
Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 C:\Windows\SysWOW64\printschunker.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad C:\Windows\SysWOW64\printschunker.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-17-9c-c4-2a-e2\WpadDecision = "0" C:\Windows\SysWOW64\printschunker.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" C:\Windows\SysWOW64\printschunker.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-17-9c-c4-2a-e2\WpadDecisionReason = "1" C:\Windows\SysWOW64\printschunker.exe N/A
Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-17-9c-c4-2a-e2\WpadDecisionTime = c022ff9f44b7da01 C:\Windows\SysWOW64\printschunker.exe N/A
Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-17-9c-c4-2a-e2 C:\Windows\SysWOW64\printschunker.exe N/A
Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{DC5DC725-7EE4-4106-A354-37B58A2E741F} C:\Windows\SysWOW64\printschunker.exe N/A
Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{DC5DC725-7EE4-4106-A354-37B58A2E741F}\WpadDecisionTime = c022ff9f44b7da01 C:\Windows\SysWOW64\printschunker.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{DC5DC725-7EE4-4106-A354-37B58A2E741F}\WpadDecision = "0" C:\Windows\SysWOW64\printschunker.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\printschunker.exe N/A
N/A N/A C:\Windows\SysWOW64\printschunker.exe N/A
N/A N/A C:\Windows\SysWOW64\printschunker.exe N/A
N/A N/A C:\Windows\SysWOW64\printschunker.exe N/A

Suspicious behavior: RenamesItself

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\98292ead4d99d7ea433b0a0660ceb2f0_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\98292ead4d99d7ea433b0a0660ceb2f0_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\98292ead4d99d7ea433b0a0660ceb2f0_JaffaCakes118.exe"

C:\Users\Admin\AppData\Local\Temp\98292ead4d99d7ea433b0a0660ceb2f0_JaffaCakes118.exe

--c4660c42

C:\Windows\SysWOW64\printschunker.exe

"C:\Windows\SysWOW64\printschunker.exe"

C:\Windows\SysWOW64\printschunker.exe

--4e948aaa

Network

Country Destination Domain Proto
US 70.32.78.99:8080 tcp
US 70.32.78.99:8080 tcp
PL 213.189.36.51:8080 tcp
PL 213.189.36.51:8080 tcp
US 107.170.27.84:443 tcp
US 107.170.27.84:443 tcp
GB 85.234.143.94:8080 tcp
GB 85.234.143.94:8080 tcp

Files

memory/1764-0-0x00000000005E0000-0x00000000005F7000-memory.dmp

memory/1764-5-0x00000000005C0000-0x00000000005D1000-memory.dmp

memory/2996-6-0x0000000000260000-0x0000000000277000-memory.dmp

memory/1448-11-0x0000000000370000-0x0000000000387000-memory.dmp

memory/1680-16-0x0000000000470000-0x0000000000487000-memory.dmp

memory/2996-21-0x0000000000400000-0x000000000042B000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-05 12:27

Reported

2024-06-05 12:36

Platform

win10v2004-20240426-en

Max time kernel

5s

Max time network

164s

Command Line

"C:\Users\Admin\AppData\Local\Temp\98292ead4d99d7ea433b0a0660ceb2f0_JaffaCakes118.exe"

Signatures

Processes

C:\Users\Admin\AppData\Local\Temp\98292ead4d99d7ea433b0a0660ceb2f0_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\98292ead4d99d7ea433b0a0660ceb2f0_JaffaCakes118.exe"

C:\Users\Admin\AppData\Local\Temp\98292ead4d99d7ea433b0a0660ceb2f0_JaffaCakes118.exe

--c4660c42

C:\Windows\SysWOW64\chunkernic.exe

"C:\Windows\SysWOW64\chunkernic.exe"

C:\Windows\SysWOW64\chunkernic.exe

--9f42ed00

Network

Country Destination Domain Proto
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 0.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 70.32.78.99:8080 tcp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
PL 213.189.36.51:8080 tcp
US 107.170.27.84:443 tcp
GB 85.234.143.94:8080 tcp
US 8.8.8.8:53 29.243.111.52.in-addr.arpa udp
BO 200.58.83.179:80 tcp
NL 51.15.8.192:8080 tcp
US 8.8.8.8:53 67.112.168.52.in-addr.arpa udp

Files

memory/3972-5-0x0000000002180000-0x0000000002191000-memory.dmp

memory/3972-0-0x00000000021A0000-0x00000000021B7000-memory.dmp

memory/4328-6-0x0000000002060000-0x0000000002077000-memory.dmp

memory/4792-12-0x0000000000FA0000-0x0000000000FB7000-memory.dmp

memory/4328-23-0x0000000000400000-0x000000000042B000-memory.dmp

memory/3288-18-0x00000000006B0000-0x00000000006C7000-memory.dmp

C:\ProgramData\Microsoft\Crypto\RSA\S-1-5-18\5ee9f8cddb3ff188c6a99dcf99203008_41e50f4a-4a76-42e1-a3df-51306e426307

MD5 aaec799e344163d0d188e0590697cb1e
SHA1 94aa3e9674f1335e1cdf6dc7b7c7cdbf5c97c65d
SHA256 d627b40c75603106e24782fdb852c180722ae6d472bdb60367bf2708f28f5454
SHA512 285e78b5ddc3049b2b167e0c785f410260eecdbb745489e3e5984e118c627e97b7499f8a937a4a6d5da4fe046fb220fc70fd5abc583083909fd005b1ee4f03b0