Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
31/08/2024, 14:31
Static task
static1
Behavioral task
behavioral1
Sample
ccfb2c8d1067f344c8641be9a94a5b4f_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
ccfb2c8d1067f344c8641be9a94a5b4f_JaffaCakes118.exe
-
Size
572KB
-
MD5
ccfb2c8d1067f344c8641be9a94a5b4f
-
SHA1
3ba4446053b3cb0c192d476df06e28ae3f6d6685
-
SHA256
67e215d00bc82ece78aefacc35df1caa48f235efe82a25d7be9f7d5a265ae7ff
-
SHA512
c1164eb47bc878e4ade62f01fcc7cd32af3f9b17f6bd08194301b824fccd3a576e33c10aa9ac3490e34255a9b748798c6e1c5f6146ccbef3e28d3adf665b9234
-
SSDEEP
6144:XLOYXpa/ummNl/C5lXS/U6zJjSOd77yPZ5qxSorTCQ2z07517kBebS9ZuXCxnS9d:X6ummjiX6B+PZC+OLyZZS9rVFnF
Malware Config
Extracted
emotet
Epoch3
200.41.121.69:443
153.190.41.185:80
165.100.148.200:443
103.9.145.19:8080
46.105.128.215:8080
172.105.213.30:80
69.30.205.162:7080
172.104.70.207:8080
198.57.217.170:8080
103.122.75.218:80
212.112.113.235:80
113.52.135.33:7080
60.53.3.153:8080
1.32.54.12:8080
142.93.87.198:8080
91.117.31.181:80
45.129.121.222:443
186.215.101.106:80
143.95.101.72:8080
187.233.220.93:443
128.92.54.20:80
181.197.108.171:443
78.186.102.195:80
193.33.38.208:443
51.38.134.203:8080
24.27.122.202:80
181.47.235.26:993
210.111.160.220:80
162.144.46.90:8080
176.58.93.123:80
46.17.6.116:8080
174.57.150.13:8080
178.134.1.238:80
95.216.212.157:8080
37.59.24.25:8080
172.90.70.168:443
5.189.148.98:8080
177.103.201.23:80
115.179.91.58:80
200.71.112.158:53
190.161.67.63:80
23.253.207.142:8080
85.109.190.235:443
89.215.225.15:80
67.171.182.231:80
195.191.107.67:80
188.230.134.205:80
58.93.151.148:80
138.197.140.163:8080
122.11.164.183:80
192.161.190.171:8080
192.241.220.183:8080
190.5.162.204:80
119.159.150.176:443
83.99.211.160:80
210.224.65.117:80
211.218.105.101:80
50.116.78.109:8080
163.172.97.112:8080
98.15.140.226:80
216.75.37.196:8080
181.44.166.242:80
67.254.196.78:443
81.82.247.216:80
192.210.217.94:8080
190.171.135.235:80
110.142.161.90:80
83.110.107.243:443
86.6.123.109:80
72.69.99.47:80
83.156.88.159:80
189.61.200.9:443
95.216.207.86:7080
82.79.244.92:80
124.150.175.129:8080
182.176.116.139:995
46.105.131.68:8080
85.105.183.228:443
77.245.12.212:80
190.189.79.73:80
201.183.251.100:80
123.142.37.165:80
187.250.92.82:80
221.154.59.110:80
78.46.87.133:8080
195.250.143.182:80
152.169.32.143:8080
201.196.15.79:990
41.77.74.214:443
24.28.178.71:80
190.101.87.170:80
72.27.212.209:8080
191.100.24.201:50000
192.163.221.191:8080
212.129.14.27:8080
124.150.175.133:80
41.218.118.66:80
189.225.211.171:443
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mailboxwiz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ccfb2c8d1067f344c8641be9a94a5b4f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ccfb2c8d1067f344c8641be9a94a5b4f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mailboxwiz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mailboxwiz.exe -
Modifies data under HKEY_USERS 21 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mailboxwiz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mailboxwiz.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1AC2F265-B442-43F5-8E47-06464681C054} mailboxwiz.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\36-a7-58-91-26-d4\WpadDecisionTime = 70d55e7bb2fbda01 mailboxwiz.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mailboxwiz.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mailboxwiz.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mailboxwiz.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1AC2F265-B442-43F5-8E47-06464681C054}\WpadNetworkName = "Network 3" mailboxwiz.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mailboxwiz.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mailboxwiz.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0187000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mailboxwiz.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1AC2F265-B442-43F5-8E47-06464681C054}\WpadDecisionTime = 70d55e7bb2fbda01 mailboxwiz.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\36-a7-58-91-26-d4 mailboxwiz.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\36-a7-58-91-26-d4\WpadDecision = "0" mailboxwiz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mailboxwiz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mailboxwiz.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1AC2F265-B442-43F5-8E47-06464681C054}\WpadDecision = "0" mailboxwiz.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1AC2F265-B442-43F5-8E47-06464681C054}\36-a7-58-91-26-d4 mailboxwiz.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\36-a7-58-91-26-d4\WpadDecisionReason = "1" mailboxwiz.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mailboxwiz.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1AC2F265-B442-43F5-8E47-06464681C054}\WpadDecisionReason = "1" mailboxwiz.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2752 mailboxwiz.exe 2752 mailboxwiz.exe 2752 mailboxwiz.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2468 ccfb2c8d1067f344c8641be9a94a5b4f_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2808 ccfb2c8d1067f344c8641be9a94a5b4f_JaffaCakes118.exe 2808 ccfb2c8d1067f344c8641be9a94a5b4f_JaffaCakes118.exe 2468 ccfb2c8d1067f344c8641be9a94a5b4f_JaffaCakes118.exe 2468 ccfb2c8d1067f344c8641be9a94a5b4f_JaffaCakes118.exe 2936 mailboxwiz.exe 2936 mailboxwiz.exe 2752 mailboxwiz.exe 2752 mailboxwiz.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2808 wrote to memory of 2468 2808 ccfb2c8d1067f344c8641be9a94a5b4f_JaffaCakes118.exe 30 PID 2808 wrote to memory of 2468 2808 ccfb2c8d1067f344c8641be9a94a5b4f_JaffaCakes118.exe 30 PID 2808 wrote to memory of 2468 2808 ccfb2c8d1067f344c8641be9a94a5b4f_JaffaCakes118.exe 30 PID 2808 wrote to memory of 2468 2808 ccfb2c8d1067f344c8641be9a94a5b4f_JaffaCakes118.exe 30 PID 2936 wrote to memory of 2752 2936 mailboxwiz.exe 32 PID 2936 wrote to memory of 2752 2936 mailboxwiz.exe 32 PID 2936 wrote to memory of 2752 2936 mailboxwiz.exe 32 PID 2936 wrote to memory of 2752 2936 mailboxwiz.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ccfb2c8d1067f344c8641be9a94a5b4f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ccfb2c8d1067f344c8641be9a94a5b4f_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\ccfb2c8d1067f344c8641be9a94a5b4f_JaffaCakes118.exe--df632b2e2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:2468
-
-
C:\Windows\SysWOW64\mailboxwiz.exe"C:\Windows\SysWOW64\mailboxwiz.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\mailboxwiz.exe--8d2cb4662⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2752
-