Analysis
-
max time kernel
137s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-07-2024 19:16
Static task
static1
Behavioral task
behavioral1
Sample
610d7bb9f9725d5b736843123d27f1bc_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
610d7bb9f9725d5b736843123d27f1bc_JaffaCakes118.exe
-
Size
167KB
-
MD5
610d7bb9f9725d5b736843123d27f1bc
-
SHA1
3706cb0a13c1e4ebe1ebc05aee0a1d23049abcca
-
SHA256
1d79c23865675ea988e8da616d87729fc029e3da8655a452ec8603c2645ed29c
-
SHA512
a4c5e017007f2a3bb905ac9aad6e87e54ae8582e3b1e8f2fa7ebc121faece5f13385b655b0acb545bb002855d5f65a0864b30154fa3a1381fe5eaf324d65ea20
-
SSDEEP
3072:2dEnuxOmCghim2GDJwNAz0zKju491jZqMNJs:2dDfh80JYAhvJ
Malware Config
Extracted
emotet
Epoch2
80.11.163.139:443
85.54.169.141:8080
185.14.187.201:8080
45.79.188.67:8080
63.142.253.122:8080
24.51.106.145:21
91.205.215.66:8080
222.214.218.192:8080
80.11.163.139:21
190.108.228.48:990
88.247.163.44:80
88.156.97.210:80
95.128.43.213:8080
211.63.71.72:8080
182.176.132.213:8090
182.176.106.43:995
186.4.172.5:8080
178.79.161.166:443
101.187.237.217:20
136.243.177.26:8080
181.31.213.158:8080
87.106.139.101:8080
41.220.119.246:80
206.189.98.125:8080
190.18.146.70:80
45.33.49.124:443
187.144.189.58:50000
189.209.217.49:80
87.230.19.21:8080
212.71.234.16:8080
181.143.53.227:21
217.160.182.191:8080
186.4.172.5:443
104.236.246.93:8080
190.106.97.230:443
103.97.95.218:143
178.254.6.27:7080
92.233.128.13:143
188.166.253.46:8080
94.205.247.10:80
115.78.95.230:443
169.239.182.217:8080
37.157.194.134:443
104.131.11.150:8080
45.123.3.54:443
5.196.74.210:8080
179.32.19.219:22
78.24.219.147:8080
85.104.59.244:20
201.251.43.69:8080
190.228.72.244:53
103.255.150.84:80
92.222.216.44:8080
173.212.203.26:8080
182.76.6.2:8080
124.240.198.66:80
190.53.135.159:21
46.105.131.87:80
190.226.44.20:21
190.211.207.11:443
199.19.237.192:80
186.75.241.230:80
186.4.172.5:20
149.167.86.174:990
149.202.153.252:8080
87.106.136.232:8080
78.188.105.159:21
83.136.245.190:8080
181.143.194.138:443
159.65.25.128:8080
86.98.25.30:53
85.106.1.166:50000
138.201.140.110:8080
185.94.252.13:443
142.44.162.209:8080
92.222.125.16:7080
27.4.80.183:443
190.186.203.55:80
200.71.148.138:8080
31.12.67.62:7080
31.172.240.91:8080
62.75.187.192:8080
144.139.247.220:80
27.147.163.188:8080
217.145.83.44:80
119.15.153.237:80
47.41.213.2:22
190.145.67.134:8090
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat choreallow.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 21 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 choreallow.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" choreallow.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings choreallow.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f018c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 choreallow.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E0A09EB3-E4D5-4448-8FA1-8C2CAC1ECD1C}\WpadDecisionTime = 80210199a2dbda01 choreallow.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e6-e9-08-ee-5f-85\WpadDecision = "0" choreallow.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" choreallow.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E0A09EB3-E4D5-4448-8FA1-8C2CAC1ECD1C}\WpadNetworkName = "Network 3" choreallow.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E0A09EB3-E4D5-4448-8FA1-8C2CAC1ECD1C}\e6-e9-08-ee-5f-85 choreallow.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings choreallow.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 choreallow.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E0A09EB3-E4D5-4448-8FA1-8C2CAC1ECD1C} choreallow.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e6-e9-08-ee-5f-85 choreallow.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e6-e9-08-ee-5f-85\WpadDecisionReason = "1" choreallow.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e6-e9-08-ee-5f-85\WpadDecisionTime = 80210199a2dbda01 choreallow.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections choreallow.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix choreallow.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" choreallow.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad choreallow.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E0A09EB3-E4D5-4448-8FA1-8C2CAC1ECD1C}\WpadDecisionReason = "1" choreallow.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E0A09EB3-E4D5-4448-8FA1-8C2CAC1ECD1C}\WpadDecision = "0" choreallow.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2400 choreallow.exe 2400 choreallow.exe 2400 choreallow.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2692 610d7bb9f9725d5b736843123d27f1bc_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 4 IoCs
pid Process 2076 610d7bb9f9725d5b736843123d27f1bc_JaffaCakes118.exe 2692 610d7bb9f9725d5b736843123d27f1bc_JaffaCakes118.exe 2376 choreallow.exe 2400 choreallow.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2692 2076 610d7bb9f9725d5b736843123d27f1bc_JaffaCakes118.exe 30 PID 2076 wrote to memory of 2692 2076 610d7bb9f9725d5b736843123d27f1bc_JaffaCakes118.exe 30 PID 2076 wrote to memory of 2692 2076 610d7bb9f9725d5b736843123d27f1bc_JaffaCakes118.exe 30 PID 2076 wrote to memory of 2692 2076 610d7bb9f9725d5b736843123d27f1bc_JaffaCakes118.exe 30 PID 2376 wrote to memory of 2400 2376 choreallow.exe 33 PID 2376 wrote to memory of 2400 2376 choreallow.exe 33 PID 2376 wrote to memory of 2400 2376 choreallow.exe 33 PID 2376 wrote to memory of 2400 2376 choreallow.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\610d7bb9f9725d5b736843123d27f1bc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\610d7bb9f9725d5b736843123d27f1bc_JaffaCakes118.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\610d7bb9f9725d5b736843123d27f1bc_JaffaCakes118.exe--231c9b272⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
PID:2692
-
-
C:\Windows\SysWOW64\choreallow.exe"C:\Windows\SysWOW64\choreallow.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\choreallow.exe--cb52d91e2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:2400
-