Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
18-06-2024 08:14
Static task
static1
Behavioral task
behavioral1
Sample
baad30cb86f86401906e4a3388239428_JaffaCakes118.exe
Resource
win7-20240419-en
General
-
Target
baad30cb86f86401906e4a3388239428_JaffaCakes118.exe
-
Size
544KB
-
MD5
baad30cb86f86401906e4a3388239428
-
SHA1
3d5ef3aa9117c56e1399be3fe3cb4e7b922cb41d
-
SHA256
98599cc704e7689ef5a8b9b13c4fab8f2fae50f0b776aa9c37633ab33232c63f
-
SHA512
212c22efc3216c99d0d9eb0df8658d69da73e5efe229aa8d0d18f50db3f779133591d68d999fce1df9b3db9bacf39ddd462ef27dc9ab755a519be822f243a487
-
SSDEEP
6144:ATp3XYyIMYUTgOBeWoavwiU5yu5g222222222222K7bqPe:ATp3XYBUEOBeGwiUA07bD
Malware Config
Extracted
emotet
Epoch1
37.52.87.0:80
87.118.70.45:8080
91.121.54.71:8080
116.125.120.88:443
24.135.198.218:80
103.106.236.83:8080
219.92.13.25:80
89.32.150.160:8080
24.135.1.177:80
82.196.15.205:8080
190.147.137.153:443
170.81.48.2:80
51.159.23.217:443
77.55.211.77:8080
204.225.249.100:7080
191.182.6.118:80
188.2.217.94:80
61.92.159.208:8080
152.169.22.67:80
172.104.169.32:8080
190.2.31.172:80
186.103.141.250:443
192.241.146.84:8080
50.28.51.143:8080
65.36.62.20:80
137.74.106.111:7080
190.6.193.152:8080
51.255.165.160:8080
94.176.234.118:443
212.71.237.140:8080
190.128.173.10:80
104.131.103.37:8080
177.74.228.34:80
2.47.112.152:80
83.169.21.32:7080
177.72.13.80:80
181.129.96.162:8080
91.219.169.180:80
104.131.41.185:8080
209.236.123.42:8080
189.2.177.210:443
70.32.84.74:8080
45.33.77.42:8080
185.94.252.12:80
45.173.88.33:80
85.105.140.135:443
82.163.245.38:80
5.196.35.138:7080
190.190.148.27:8080
178.250.54.208:8080
190.24.243.186:80
111.67.12.221:8080
181.30.61.163:443
73.116.193.136:80
199.203.62.165:80
77.90.136.129:8080
190.163.31.26:80
58.171.153.81:80
138.97.60.141:7080
174.100.27.229:80
207.144.103.227:80
77.238.212.227:80
12.162.84.2:8080
70.32.115.157:8080
68.183.170.114:8080
186.70.127.199:8090
95.9.180.128:80
67.247.242.247:80
219.92.8.17:8080
190.195.129.227:8090
217.13.106.14:8080
187.162.248.237:80
82.76.111.249:443
185.94.252.27:443
213.60.96.117:80
177.73.0.98:443
45.161.242.102:80
188.135.15.49:80
178.79.163.131:8080
114.109.179.60:80
212.93.117.170:80
87.106.46.107:8080
217.199.160.224:7080
190.115.18.139:8080
191.99.160.58:80
24.148.98.177:80
189.131.57.131:80
81.129.198.57:80
73.213.208.163:80
192.241.143.52:8080
149.62.173.247:8080
72.47.248.48:7080
68.183.190.199:8080
46.28.111.142:7080
85.109.159.61:443
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
winhttpcom.exepid process 1372 winhttpcom.exe -
Drops file in System32 directory 1 IoCs
Processes:
baad30cb86f86401906e4a3388239428_JaffaCakes118.exedescription ioc process File opened for modification C:\Windows\SysWOW64\vcomp120\winhttpcom.exe baad30cb86f86401906e4a3388239428_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
winhttpcom.exepid process 1372 winhttpcom.exe 1372 winhttpcom.exe 1372 winhttpcom.exe 1372 winhttpcom.exe 1372 winhttpcom.exe 1372 winhttpcom.exe 1372 winhttpcom.exe 1372 winhttpcom.exe 1372 winhttpcom.exe 1372 winhttpcom.exe 1372 winhttpcom.exe 1372 winhttpcom.exe 1372 winhttpcom.exe 1372 winhttpcom.exe 1372 winhttpcom.exe 1372 winhttpcom.exe 1372 winhttpcom.exe 1372 winhttpcom.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
baad30cb86f86401906e4a3388239428_JaffaCakes118.exepid process 3272 baad30cb86f86401906e4a3388239428_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
baad30cb86f86401906e4a3388239428_JaffaCakes118.exewinhttpcom.exepid process 3272 baad30cb86f86401906e4a3388239428_JaffaCakes118.exe 3272 baad30cb86f86401906e4a3388239428_JaffaCakes118.exe 3272 baad30cb86f86401906e4a3388239428_JaffaCakes118.exe 1372 winhttpcom.exe 1372 winhttpcom.exe 1372 winhttpcom.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
baad30cb86f86401906e4a3388239428_JaffaCakes118.exedescription pid process target process PID 3272 wrote to memory of 1372 3272 baad30cb86f86401906e4a3388239428_JaffaCakes118.exe winhttpcom.exe PID 3272 wrote to memory of 1372 3272 baad30cb86f86401906e4a3388239428_JaffaCakes118.exe winhttpcom.exe PID 3272 wrote to memory of 1372 3272 baad30cb86f86401906e4a3388239428_JaffaCakes118.exe winhttpcom.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\baad30cb86f86401906e4a3388239428_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\baad30cb86f86401906e4a3388239428_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\vcomp120\winhttpcom.exe"C:\Windows\SysWOW64\vcomp120\winhttpcom.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\vcomp120\winhttpcom.exeFilesize
544KB
MD5baad30cb86f86401906e4a3388239428
SHA13d5ef3aa9117c56e1399be3fe3cb4e7b922cb41d
SHA25698599cc704e7689ef5a8b9b13c4fab8f2fae50f0b776aa9c37633ab33232c63f
SHA512212c22efc3216c99d0d9eb0df8658d69da73e5efe229aa8d0d18f50db3f779133591d68d999fce1df9b3db9bacf39ddd462ef27dc9ab755a519be822f243a487
-
memory/1372-7-0x00000000023E0000-0x00000000023EC000-memory.dmpFilesize
48KB
-
memory/1372-11-0x00000000023E0000-0x00000000023EC000-memory.dmpFilesize
48KB
-
memory/3272-0-0x00000000022A0000-0x00000000022AC000-memory.dmpFilesize
48KB
-
memory/3272-4-0x00000000007F0000-0x00000000007F9000-memory.dmpFilesize
36KB
-
memory/3272-6-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB