Analysis
-
max time kernel
139s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
15/06/2024, 10:51
Static task
static1
Behavioral task
behavioral1
Sample
ae1455cf11d1fec6c3c932c59aab4080_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
ae1455cf11d1fec6c3c932c59aab4080_JaffaCakes118.exe
-
Size
524KB
-
MD5
ae1455cf11d1fec6c3c932c59aab4080
-
SHA1
6936242c741d85f78a59dc72bc9bf9323f45fa79
-
SHA256
5ef20ca54fea2125d4d53a09815abce782ad1b28cdf3718b9a03395fe223de4f
-
SHA512
9c66e1b3ddb38e155f53021a0ee50f19a6553b2b9dcbe23eed9a79f9f2ca609c8144128dd88dcd155b558aa925ca37b64f2d909a4caeb8b0353d180091d5af18
-
SSDEEP
12288:jd5NbNrpPekZ441WNcHnh4ZZFXsQOM7FQm:jddv1WNcHy/F
Malware Config
Extracted
emotet
Epoch1
174.113.69.136:80
51.38.124.206:80
82.196.15.205:8080
38.88.126.202:8080
190.115.18.139:8080
98.13.75.196:80
181.30.61.163:443
82.76.111.249:443
181.129.96.162:8080
74.58.215.226:80
68.69.155.181:80
188.135.15.49:80
190.163.31.26:80
50.121.220.50:80
51.159.23.217:443
2.47.112.152:80
185.215.227.107:443
217.13.106.14:8080
70.32.115.157:8080
170.81.48.2:80
73.213.208.163:80
5.196.35.138:7080
190.24.243.186:80
192.241.143.52:8080
185.183.16.47:80
184.66.18.83:80
187.162.248.237:80
220.109.145.69:80
51.255.165.160:8080
82.230.1.24:80
94.176.234.118:443
104.131.103.37:8080
50.28.51.143:8080
12.162.84.2:8080
74.136.144.133:80
77.90.136.129:8080
68.183.190.199:8080
96.245.123.149:80
177.74.228.34:80
213.197.182.158:8080
45.46.37.97:80
110.142.219.51:80
192.241.146.84:8080
189.2.177.210:443
177.73.0.98:443
61.197.92.216:80
185.178.10.77:80
212.71.237.140:8080
65.36.62.20:80
190.195.129.227:8090
217.199.160.224:7080
138.97.60.141:7080
155.186.0.121:80
204.225.249.100:7080
92.24.50.153:80
83.169.21.32:7080
190.6.193.152:8080
219.92.13.25:80
186.103.141.250:443
80.11.164.185:80
45.16.226.117:443
67.247.242.247:80
190.2.31.172:80
77.238.212.227:80
64.201.88.132:80
185.94.252.27:443
199.203.62.165:80
190.147.137.153:443
111.67.77.202:8080
172.104.169.32:8080
5.189.178.202:8080
190.190.148.27:8080
191.182.6.118:80
45.161.242.102:80
70.32.84.74:8080
45.33.77.42:8080
72.47.248.48:7080
114.158.45.53:80
209.236.123.42:8080
137.74.106.111:7080
54.37.42.48:8080
95.9.180.128:80
96.227.52.8:443
152.169.22.67:80
104.131.41.185:8080
77.106.157.34:8080
111.67.12.221:8080
61.92.159.208:8080
178.250.54.208:8080
68.183.170.114:8080
78.249.119.122:80
186.70.127.199:8090
216.47.196.104:80
185.94.252.12:80
87.106.46.107:8080
Signatures
-
resource yara_rule behavioral2/memory/4052-0-0x0000000000A50000-0x0000000000A62000-memory.dmp emotet behavioral2/memory/4052-7-0x0000000000A40000-0x0000000000A4F000-memory.dmp emotet behavioral2/memory/4052-4-0x0000000000A70000-0x0000000000A80000-memory.dmp emotet behavioral2/memory/2916-10-0x0000000000890000-0x00000000008A2000-memory.dmp emotet behavioral2/memory/2916-14-0x0000000000500000-0x0000000000510000-memory.dmp emotet -
Executes dropped EXE 1 IoCs
pid Process 2916 KBDLA.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\vsstrace\KBDLA.exe ae1455cf11d1fec6c3c932c59aab4080_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 2916 KBDLA.exe 2916 KBDLA.exe 2916 KBDLA.exe 2916 KBDLA.exe 2916 KBDLA.exe 2916 KBDLA.exe 2916 KBDLA.exe 2916 KBDLA.exe 2916 KBDLA.exe 2916 KBDLA.exe 2916 KBDLA.exe 2916 KBDLA.exe 2916 KBDLA.exe 2916 KBDLA.exe 2916 KBDLA.exe 2916 KBDLA.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4052 ae1455cf11d1fec6c3c932c59aab4080_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4052 ae1455cf11d1fec6c3c932c59aab4080_JaffaCakes118.exe 4052 ae1455cf11d1fec6c3c932c59aab4080_JaffaCakes118.exe 2916 KBDLA.exe 2916 KBDLA.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4052 wrote to memory of 2916 4052 ae1455cf11d1fec6c3c932c59aab4080_JaffaCakes118.exe 92 PID 4052 wrote to memory of 2916 4052 ae1455cf11d1fec6c3c932c59aab4080_JaffaCakes118.exe 92 PID 4052 wrote to memory of 2916 4052 ae1455cf11d1fec6c3c932c59aab4080_JaffaCakes118.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae1455cf11d1fec6c3c932c59aab4080_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ae1455cf11d1fec6c3c932c59aab4080_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\SysWOW64\vsstrace\KBDLA.exe"C:\Windows\SysWOW64\vsstrace\KBDLA.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3492,i,3671441404766730751,12082497324212183132,262144 --variations-seed-version --mojo-platform-channel-handle=4132 /prefetch:81⤵PID:2276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
524KB
MD5ae1455cf11d1fec6c3c932c59aab4080
SHA16936242c741d85f78a59dc72bc9bf9323f45fa79
SHA2565ef20ca54fea2125d4d53a09815abce782ad1b28cdf3718b9a03395fe223de4f
SHA5129c66e1b3ddb38e155f53021a0ee50f19a6553b2b9dcbe23eed9a79f9f2ca609c8144128dd88dcd155b558aa925ca37b64f2d909a4caeb8b0353d180091d5af18