Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/08/2024, 08:13
Static task
static1
Behavioral task
behavioral1
Sample
856283229e69bcbb1ee2da5c9f537faa_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
856283229e69bcbb1ee2da5c9f537faa_JaffaCakes118.exe
-
Size
212KB
-
MD5
856283229e69bcbb1ee2da5c9f537faa
-
SHA1
6d7904d3df1ceb30a0b38d1f0a608f10a8c74bf7
-
SHA256
a00f1c1ed74cad1a2a899ce9908c9aa5797695e6257623940f66a752c6e290d7
-
SHA512
a7e5c0de3f4ad1249ea796b7d2d5b6f7d68df5b9bdc17a5ebf1bb97f244faaa55724c8aeaa03893139253bff76d826eec29c924e1f748624931be32a9f8c50d8
-
SSDEEP
3072:gKdoleKfKf5h7SI9wzET3ksCcQ8zFl1q/S1z4EQCbRrMUrZ:gKdlKfK/7SI9wolCcrX1zEDE
Malware Config
Extracted
emotet
Epoch1
128.92.203.42:80
37.187.161.206:8080
202.29.239.162:443
80.87.201.221:7080
190.188.245.242:80
12.163.208.58:80
213.197.182.158:8080
201.213.177.139:80
62.84.75.50:80
45.33.77.42:8080
185.183.16.47:80
78.249.119.122:80
177.129.17.170:443
51.15.7.189:80
152.169.22.67:80
119.106.216.84:80
109.169.12.78:80
51.15.7.145:80
219.92.13.25:80
190.117.79.209:80
35.143.99.174:80
51.255.165.160:8080
209.236.123.42:8080
70.32.115.157:8080
155.186.0.121:80
177.73.0.98:443
181.129.96.162:8080
45.46.37.97:80
178.250.54.208:8080
68.183.170.114:8080
51.38.124.206:80
203.205.28.68:80
46.43.2.95:8080
65.36.62.20:80
70.116.143.84:80
5.189.178.202:8080
190.115.18.139:8080
74.58.215.226:80
185.94.252.12:80
51.75.33.127:80
190.190.148.27:8080
82.76.111.249:443
137.74.106.111:7080
85.214.26.7:8080
76.168.54.203:80
60.93.23.51:80
188.135.15.49:80
186.103.141.250:443
202.134.4.210:7080
185.232.182.218:80
104.131.41.185:8080
123.51.47.18:80
217.13.106.14:8080
116.202.23.3:8080
186.70.127.199:8090
94.176.234.118:443
5.196.35.138:7080
216.47.196.104:80
96.227.52.8:443
191.182.6.118:80
174.113.69.136:80
87.106.253.248:8080
192.241.146.84:8080
190.24.243.186:80
68.183.190.199:8080
12.162.84.2:8080
189.2.177.210:443
98.13.75.196:80
185.94.252.27:443
64.201.88.132:80
149.202.72.142:7080
172.104.169.32:8080
181.74.0.251:80
87.106.46.107:8080
60.108.144.104:443
170.81.48.2:80
67.247.242.247:80
212.71.237.140:8080
202.4.58.197:80
189.35.44.221:80
138.97.60.141:7080
50.121.220.50:80
2.36.95.106:80
177.74.228.34:80
83.169.21.32:7080
111.67.12.221:8080
192.81.38.31:80
70.169.17.134:80
77.238.212.227:80
61.197.92.216:80
82.230.1.24:80
95.9.180.128:80
50.28.51.143:8080
70.32.84.74:8080
1.226.84.243:8080
192.241.143.52:8080
181.30.61.163:443
74.136.144.133:80
45.33.35.74:8080
Signatures
-
resource yara_rule behavioral2/memory/2704-4-0x0000000000590000-0x00000000005A0000-memory.dmp emotet behavioral2/memory/2704-0-0x00000000005B0000-0x00000000005C2000-memory.dmp emotet behavioral2/memory/2704-7-0x0000000000580000-0x000000000058F000-memory.dmp emotet behavioral2/memory/3980-10-0x00000000004A0000-0x00000000004B2000-memory.dmp emotet behavioral2/memory/3980-14-0x0000000000480000-0x0000000000490000-memory.dmp emotet -
Executes dropped EXE 1 IoCs
pid Process 3980 icmp.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\KBDAL\icmp.exe 856283229e69bcbb1ee2da5c9f537faa_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 856283229e69bcbb1ee2da5c9f537faa_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icmp.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3980 icmp.exe 3980 icmp.exe 3980 icmp.exe 3980 icmp.exe 3980 icmp.exe 3980 icmp.exe 3980 icmp.exe 3980 icmp.exe 3980 icmp.exe 3980 icmp.exe 3980 icmp.exe 3980 icmp.exe 3980 icmp.exe 3980 icmp.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2704 856283229e69bcbb1ee2da5c9f537faa_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2704 wrote to memory of 3980 2704 856283229e69bcbb1ee2da5c9f537faa_JaffaCakes118.exe 85 PID 2704 wrote to memory of 3980 2704 856283229e69bcbb1ee2da5c9f537faa_JaffaCakes118.exe 85 PID 2704 wrote to memory of 3980 2704 856283229e69bcbb1ee2da5c9f537faa_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\856283229e69bcbb1ee2da5c9f537faa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\856283229e69bcbb1ee2da5c9f537faa_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\KBDAL\icmp.exe"C:\Windows\SysWOW64\KBDAL\icmp.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD5856283229e69bcbb1ee2da5c9f537faa
SHA16d7904d3df1ceb30a0b38d1f0a608f10a8c74bf7
SHA256a00f1c1ed74cad1a2a899ce9908c9aa5797695e6257623940f66a752c6e290d7
SHA512a7e5c0de3f4ad1249ea796b7d2d5b6f7d68df5b9bdc17a5ebf1bb97f244faaa55724c8aeaa03893139253bff76d826eec29c924e1f748624931be32a9f8c50d8