Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240729-en -
resource tags
arch:x64arch:x86image:win10v2004-20240729-enlocale:en-usos:windows10-2004-x64system -
submitted
29-07-2024 15:30
Static task
static1
Behavioral task
behavioral1
Sample
4f5b9117f886487c31a84faea2fcba46_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
4f5b9117f886487c31a84faea2fcba46_JaffaCakes118.exe
-
Size
168KB
-
MD5
4f5b9117f886487c31a84faea2fcba46
-
SHA1
4f55fe197029158ff0377d8e2d15da187c352d44
-
SHA256
d20b645fca2d6fde049a3d1bb6bf480e5afc39092a1707d0aa57a4addcbb0fc0
-
SHA512
91c1e1a5e9409adc5f43542a8ed027a09ea8ea026e79e028cdb8de1949df3557d6c1f87c7e5ad0dc66469d0361eb720523a314f68d6bf90cd59f3d04d59b714a
-
SSDEEP
1536:r3yCxVaZ6MWxILZRH8jdrGIp/HGmMUch7a/bD:7HxVaZT4CRHmhV/mmkdEbD
Malware Config
Extracted
emotet
Epoch2
107.5.122.110:80
199.101.86.6:443
45.55.219.163:443
62.30.7.67:443
185.94.252.104:443
203.117.253.142:80
93.51.50.171:8080
139.130.242.43:80
181.230.116.163:80
37.187.72.193:8080
194.187.133.160:443
167.86.90.214:8080
61.19.246.238:443
98.109.204.230:80
180.92.239.110:8080
121.124.124.40:7080
47.146.117.214:80
110.145.77.103:80
97.82.79.83:80
70.121.172.89:80
112.185.64.233:80
157.245.99.39:8080
85.105.205.77:8080
200.41.121.90:80
137.59.187.107:8080
24.137.76.62:80
222.214.218.37:4143
190.160.53.126:80
109.74.5.95:8080
37.139.21.175:8080
95.179.229.244:8080
24.179.13.119:80
204.197.146.48:80
189.212.199.126:443
46.105.131.79:8080
83.169.36.251:8080
104.131.11.150:443
93.147.212.206:80
187.161.206.24:80
104.131.44.150:8080
87.106.139.101:8080
91.211.88.52:7080
74.208.45.104:8080
24.43.99.75:80
176.111.60.55:8080
203.153.216.189:7080
84.39.182.7:80
78.24.219.147:8080
153.232.188.106:80
113.160.130.116:8443
37.70.8.161:80
190.55.181.54:443
139.59.60.244:8080
68.188.112.97:80
157.147.76.151:80
95.213.236.64:8080
103.86.49.11:8080
41.60.200.34:80
81.2.235.111:8080
74.120.55.163:80
5.39.91.110:7080
69.30.203.214:8080
67.205.85.243:8080
168.235.67.138:7080
201.173.217.124:443
62.75.141.82:80
152.168.248.128:443
75.139.38.211:80
85.152.162.105:80
200.114.213.233:8080
173.62.217.22:443
169.239.182.217:8080
85.66.181.138:80
174.137.65.18:80
104.236.246.93:8080
87.106.136.232:8080
209.141.54.221:8080
68.171.118.7:80
137.119.36.33:80
79.98.24.39:8080
68.44.137.144:443
47.144.21.12:443
5.196.74.210:8080
74.109.108.202:80
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3120 provcore.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\version\provcore.exe 4f5b9117f886487c31a84faea2fcba46_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4f5b9117f886487c31a84faea2fcba46_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language provcore.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3120 provcore.exe 3120 provcore.exe 3120 provcore.exe 3120 provcore.exe 3120 provcore.exe 3120 provcore.exe 3120 provcore.exe 3120 provcore.exe 3120 provcore.exe 3120 provcore.exe 3120 provcore.exe 3120 provcore.exe 3120 provcore.exe 3120 provcore.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4644 4f5b9117f886487c31a84faea2fcba46_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4644 4f5b9117f886487c31a84faea2fcba46_JaffaCakes118.exe 4644 4f5b9117f886487c31a84faea2fcba46_JaffaCakes118.exe 3120 provcore.exe 3120 provcore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4644 wrote to memory of 3120 4644 4f5b9117f886487c31a84faea2fcba46_JaffaCakes118.exe 82 PID 4644 wrote to memory of 3120 4644 4f5b9117f886487c31a84faea2fcba46_JaffaCakes118.exe 82 PID 4644 wrote to memory of 3120 4644 4f5b9117f886487c31a84faea2fcba46_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f5b9117f886487c31a84faea2fcba46_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4f5b9117f886487c31a84faea2fcba46_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SysWOW64\version\provcore.exe"C:\Windows\SysWOW64\version\provcore.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD54f5b9117f886487c31a84faea2fcba46
SHA14f55fe197029158ff0377d8e2d15da187c352d44
SHA256d20b645fca2d6fde049a3d1bb6bf480e5afc39092a1707d0aa57a4addcbb0fc0
SHA51291c1e1a5e9409adc5f43542a8ed027a09ea8ea026e79e028cdb8de1949df3557d6c1f87c7e5ad0dc66469d0361eb720523a314f68d6bf90cd59f3d04d59b714a