Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21-07-2024 19:16
Static task
static1
Behavioral task
behavioral1
Sample
610d7bb9f9725d5b736843123d27f1bc_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
610d7bb9f9725d5b736843123d27f1bc_JaffaCakes118.exe
-
Size
167KB
-
MD5
610d7bb9f9725d5b736843123d27f1bc
-
SHA1
3706cb0a13c1e4ebe1ebc05aee0a1d23049abcca
-
SHA256
1d79c23865675ea988e8da616d87729fc029e3da8655a452ec8603c2645ed29c
-
SHA512
a4c5e017007f2a3bb905ac9aad6e87e54ae8582e3b1e8f2fa7ebc121faece5f13385b655b0acb545bb002855d5f65a0864b30154fa3a1381fe5eaf324d65ea20
-
SSDEEP
3072:2dEnuxOmCghim2GDJwNAz0zKju491jZqMNJs:2dDfh80JYAhvJ
Malware Config
Extracted
emotet
Epoch2
80.11.163.139:443
85.54.169.141:8080
185.14.187.201:8080
45.79.188.67:8080
63.142.253.122:8080
24.51.106.145:21
91.205.215.66:8080
222.214.218.192:8080
80.11.163.139:21
190.108.228.48:990
88.247.163.44:80
88.156.97.210:80
95.128.43.213:8080
211.63.71.72:8080
182.176.132.213:8090
182.176.106.43:995
186.4.172.5:8080
178.79.161.166:443
101.187.237.217:20
136.243.177.26:8080
181.31.213.158:8080
87.106.139.101:8080
41.220.119.246:80
206.189.98.125:8080
190.18.146.70:80
45.33.49.124:443
187.144.189.58:50000
189.209.217.49:80
87.230.19.21:8080
212.71.234.16:8080
181.143.53.227:21
217.160.182.191:8080
186.4.172.5:443
104.236.246.93:8080
190.106.97.230:443
103.97.95.218:143
178.254.6.27:7080
92.233.128.13:143
188.166.253.46:8080
94.205.247.10:80
115.78.95.230:443
169.239.182.217:8080
37.157.194.134:443
104.131.11.150:8080
45.123.3.54:443
5.196.74.210:8080
179.32.19.219:22
78.24.219.147:8080
85.104.59.244:20
201.251.43.69:8080
190.228.72.244:53
103.255.150.84:80
92.222.216.44:8080
173.212.203.26:8080
182.76.6.2:8080
124.240.198.66:80
190.53.135.159:21
46.105.131.87:80
190.226.44.20:21
190.211.207.11:443
199.19.237.192:80
186.75.241.230:80
186.4.172.5:20
149.167.86.174:990
149.202.153.252:8080
87.106.136.232:8080
78.188.105.159:21
83.136.245.190:8080
181.143.194.138:443
159.65.25.128:8080
86.98.25.30:53
85.106.1.166:50000
138.201.140.110:8080
185.94.252.13:443
142.44.162.209:8080
92.222.125.16:7080
27.4.80.183:443
190.186.203.55:80
200.71.148.138:8080
31.12.67.62:7080
31.172.240.91:8080
62.75.187.192:8080
144.139.247.220:80
27.147.163.188:8080
217.145.83.44:80
119.15.153.237:80
47.41.213.2:22
190.145.67.134:8090
Signatures
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 enginemferror.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE enginemferror.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies enginemferror.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 enginemferror.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix enginemferror.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" enginemferror.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" enginemferror.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1424 enginemferror.exe 1424 enginemferror.exe 1424 enginemferror.exe 1424 enginemferror.exe 1424 enginemferror.exe 1424 enginemferror.exe 1424 enginemferror.exe 1424 enginemferror.exe 1424 enginemferror.exe 1424 enginemferror.exe 1424 enginemferror.exe 1424 enginemferror.exe 1424 enginemferror.exe 1424 enginemferror.exe 1424 enginemferror.exe 1424 enginemferror.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2420 610d7bb9f9725d5b736843123d27f1bc_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4836 wrote to memory of 2420 4836 610d7bb9f9725d5b736843123d27f1bc_JaffaCakes118.exe 88 PID 4836 wrote to memory of 2420 4836 610d7bb9f9725d5b736843123d27f1bc_JaffaCakes118.exe 88 PID 4836 wrote to memory of 2420 4836 610d7bb9f9725d5b736843123d27f1bc_JaffaCakes118.exe 88 PID 2452 wrote to memory of 1424 2452 enginemferror.exe 96 PID 2452 wrote to memory of 1424 2452 enginemferror.exe 96 PID 2452 wrote to memory of 1424 2452 enginemferror.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\610d7bb9f9725d5b736843123d27f1bc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\610d7bb9f9725d5b736843123d27f1bc_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\610d7bb9f9725d5b736843123d27f1bc_JaffaCakes118.exe--231c9b272⤵
- Suspicious behavior: RenamesItself
PID:2420
-
-
C:\Windows\SysWOW64\enginemferror.exe"C:\Windows\SysWOW64\enginemferror.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\enginemferror.exe--2bb65632⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1424
-