Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/08/2024, 23:01
Static task
static1
Behavioral task
behavioral1
Sample
83e63ab9108921ee5f92b76cd2c2e162_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
83e63ab9108921ee5f92b76cd2c2e162_JaffaCakes118.exe
-
Size
95KB
-
MD5
83e63ab9108921ee5f92b76cd2c2e162
-
SHA1
525ca973cd3cedc60956275cd75be622e23e0c72
-
SHA256
bf8a0f784d6f13a82ed31ca203e1ad54dc7fb1e69fbc2e7b2881c91a2b3bfa9a
-
SHA512
207072699e98600a616ce5a8c11bf8a2d0f5ebb2573407b60e0cfe2f838d7d1beffe6f7c1cc9438eecbdffa09a630866af805eb011aa24f47c9f7b6816456ff0
-
SSDEEP
1536:LGSy5eVumHHtuC4ZVmOAIb1eW99N+1PM90bpxO7IHyf3+/UARtdfhEPPYaLrn2Vu:CS+KTnYC4ZAOAV0+167wMOtdWXYauVu
Malware Config
Extracted
emotet
Epoch1
128.92.203.42:80
37.187.161.206:8080
202.29.239.162:443
80.87.201.221:7080
190.188.245.242:80
12.163.208.58:80
213.197.182.158:8080
201.213.177.139:80
62.84.75.50:80
45.33.77.42:8080
185.183.16.47:80
78.249.119.122:80
177.129.17.170:443
51.15.7.189:80
152.169.22.67:80
119.106.216.84:80
109.169.12.78:80
51.15.7.145:80
219.92.13.25:80
190.117.79.209:80
35.143.99.174:80
51.255.165.160:8080
209.236.123.42:8080
70.32.115.157:8080
155.186.0.121:80
177.73.0.98:443
181.129.96.162:8080
45.46.37.97:80
178.250.54.208:8080
68.183.170.114:8080
51.38.124.206:80
203.205.28.68:80
46.43.2.95:8080
65.36.62.20:80
70.116.143.84:80
5.189.178.202:8080
190.115.18.139:8080
74.58.215.226:80
185.94.252.12:80
51.75.33.127:80
190.190.148.27:8080
82.76.111.249:443
137.74.106.111:7080
85.214.26.7:8080
76.168.54.203:80
60.93.23.51:80
188.135.15.49:80
186.103.141.250:443
202.134.4.210:7080
185.232.182.218:80
104.131.41.185:8080
123.51.47.18:80
217.13.106.14:8080
116.202.23.3:8080
186.70.127.199:8090
94.176.234.118:443
5.196.35.138:7080
216.47.196.104:80
96.227.52.8:443
191.182.6.118:80
174.113.69.136:80
87.106.253.248:8080
192.241.146.84:8080
190.24.243.186:80
68.183.190.199:8080
12.162.84.2:8080
189.2.177.210:443
98.13.75.196:80
185.94.252.27:443
64.201.88.132:80
149.202.72.142:7080
172.104.169.32:8080
181.74.0.251:80
87.106.46.107:8080
60.108.144.104:443
170.81.48.2:80
67.247.242.247:80
212.71.237.140:8080
202.4.58.197:80
189.35.44.221:80
138.97.60.141:7080
50.121.220.50:80
2.36.95.106:80
177.74.228.34:80
83.169.21.32:7080
111.67.12.221:8080
192.81.38.31:80
70.169.17.134:80
77.238.212.227:80
61.197.92.216:80
82.230.1.24:80
95.9.180.128:80
50.28.51.143:8080
70.32.84.74:8080
1.226.84.243:8080
192.241.143.52:8080
181.30.61.163:443
74.136.144.133:80
45.33.35.74:8080
Signatures
-
resource yara_rule behavioral2/memory/1728-0-0x00000000008D0000-0x00000000008E2000-memory.dmp emotet behavioral2/memory/1728-4-0x00000000005E0000-0x00000000005F0000-memory.dmp emotet behavioral2/memory/1728-7-0x00000000005D0000-0x00000000005DF000-memory.dmp emotet behavioral2/memory/1028-14-0x0000000000910000-0x0000000000920000-memory.dmp emotet behavioral2/memory/1028-10-0x0000000000460000-0x0000000000472000-memory.dmp emotet -
Executes dropped EXE 1 IoCs
pid Process 1028 DismApi.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\secinit\DismApi.exe 83e63ab9108921ee5f92b76cd2c2e162_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DismApi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 83e63ab9108921ee5f92b76cd2c2e162_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1028 DismApi.exe 1028 DismApi.exe 1028 DismApi.exe 1028 DismApi.exe 1028 DismApi.exe 1028 DismApi.exe 1028 DismApi.exe 1028 DismApi.exe 1028 DismApi.exe 1028 DismApi.exe 1028 DismApi.exe 1028 DismApi.exe 1028 DismApi.exe 1028 DismApi.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1728 83e63ab9108921ee5f92b76cd2c2e162_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1728 wrote to memory of 1028 1728 83e63ab9108921ee5f92b76cd2c2e162_JaffaCakes118.exe 86 PID 1728 wrote to memory of 1028 1728 83e63ab9108921ee5f92b76cd2c2e162_JaffaCakes118.exe 86 PID 1728 wrote to memory of 1028 1728 83e63ab9108921ee5f92b76cd2c2e162_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\83e63ab9108921ee5f92b76cd2c2e162_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\83e63ab9108921ee5f92b76cd2c2e162_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\secinit\DismApi.exe"C:\Windows\SysWOW64\secinit\DismApi.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD583e63ab9108921ee5f92b76cd2c2e162
SHA1525ca973cd3cedc60956275cd75be622e23e0c72
SHA256bf8a0f784d6f13a82ed31ca203e1ad54dc7fb1e69fbc2e7b2881c91a2b3bfa9a
SHA512207072699e98600a616ce5a8c11bf8a2d0f5ebb2573407b60e0cfe2f838d7d1beffe6f7c1cc9438eecbdffa09a630866af805eb011aa24f47c9f7b6816456ff0