Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
127s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/09/2024, 06:30
Static task
static1
Behavioral task
behavioral1
Sample
d7b7879e0c28036feeb864c103a95a72_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d7b7879e0c28036feeb864c103a95a72_JaffaCakes118.exe
-
Size
330KB
-
MD5
d7b7879e0c28036feeb864c103a95a72
-
SHA1
d69e28e3786eb960eea26ffaee46f67ec5f978cb
-
SHA256
557f14fbb46192d0d95134d84963c70f22f81757f41200c2dc9cafcbaa7435fe
-
SHA512
573b1eeee8fd2d03fe9f6ccab4868f9941a537cb3d09fe588106f7daf3d839aa38160f6314bf99071bac288795f4e1d6831118c0ea8e31d6e9cd4612096188b7
-
SSDEEP
6144:NNXIq0JjQba44/qmsuBS1UURwdBPUVw3ejO+gGrRnOs6:rXzxbjmJBS1oPJOS+gGr2
Malware Config
Extracted
emotet
Epoch2
173.91.11.142:80
47.6.15.79:80
47.6.15.79:443
37.59.24.177:8080
66.34.201.20:7080
108.179.206.219:8080
45.56.88.91:443
101.187.134.207:443
1.33.230.137:80
110.143.57.109:80
108.191.2.72:80
47.156.70.145:80
167.71.10.37:8080
190.226.44.20:21
74.105.102.97:8080
190.147.215.53:22
24.45.193.161:7080
70.175.171.251:80
138.59.177.106:443
12.176.19.218:80
190.56.255.118:80
190.211.207.11:443
182.176.132.213:8090
31.131.182.30:80
31.31.77.83:443
181.57.193.14:80
149.202.153.252:8080
189.209.217.49:80
169.239.182.217:8080
98.24.231.64:80
176.106.183.253:8080
159.65.25.128:8080
211.63.71.72:8080
45.51.40.140:80
104.131.44.150:8080
85.72.180.68:80
100.14.117.137:80
110.143.84.202:80
188.152.7.140:80
167.99.105.223:7080
186.75.241.230:80
45.33.49.124:443
50.116.86.205:8080
62.75.187.192:8080
210.6.85.121:80
91.205.215.66:8080
128.65.154.183:443
209.141.54.221:8080
107.170.24.125:8080
178.210.51.222:8080
197.254.221.174:80
66.76.63.99:80
201.184.105.242:443
101.187.247.29:80
217.160.182.191:8080
107.2.2.28:80
190.12.119.180:443
212.186.191.177:80
218.44.21.114:80
61.197.110.214:80
165.227.156.155:443
12.229.155.122:80
67.225.179.64:8080
46.105.131.87:80
178.209.71.63:8080
192.241.255.77:8080
59.103.164.174:80
185.159.102.74:80
64.53.242.181:8080
2.38.99.79:80
5.88.182.250:80
110.142.38.16:80
75.80.148.244:80
206.189.112.148:8080
183.102.238.69:465
78.24.219.147:8080
200.7.243.108:443
209.97.168.52:8080
201.173.217.124:443
190.53.135.159:21
73.11.153.178:8080
73.176.241.255:80
104.237.155.168:443
87.106.136.232:8080
83.136.245.190:8080
212.129.24.79:8080
5.196.74.210:8080
116.48.142.21:443
167.114.242.226:8080
103.86.49.11:8080
212.64.171.206:80
139.130.241.252:443
206.81.10.215:8080
95.128.43.213:8080
87.106.139.101:8080
37.157.194.134:443
91.73.197.90:80
80.21.182.46:80
58.171.42.66:8080
93.147.141.5:80
176.31.200.130:8080
87.230.19.21:8080
104.236.246.93:8080
144.139.247.220:80
195.244.215.206:80
181.31.213.158:8080
104.131.11.150:8080
120.150.246.241:80
181.143.194.138:443
165.228.24.197:80
92.222.216.44:8080
31.172.240.91:8080
86.98.156.239:443
Signatures
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies morewsat.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 morewsat.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 morewsat.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE morewsat.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d7b7879e0c28036feeb864c103a95a72_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d7b7879e0c28036feeb864c103a95a72_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language morewsat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language morewsat.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix morewsat.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" morewsat.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" morewsat.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4892 morewsat.exe 4892 morewsat.exe 4892 morewsat.exe 4892 morewsat.exe 4892 morewsat.exe 4892 morewsat.exe 4892 morewsat.exe 4892 morewsat.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3816 d7b7879e0c28036feeb864c103a95a72_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4984 d7b7879e0c28036feeb864c103a95a72_JaffaCakes118.exe 4984 d7b7879e0c28036feeb864c103a95a72_JaffaCakes118.exe 3816 d7b7879e0c28036feeb864c103a95a72_JaffaCakes118.exe 3816 d7b7879e0c28036feeb864c103a95a72_JaffaCakes118.exe 4552 morewsat.exe 4552 morewsat.exe 4892 morewsat.exe 4892 morewsat.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4984 wrote to memory of 3816 4984 d7b7879e0c28036feeb864c103a95a72_JaffaCakes118.exe 99 PID 4984 wrote to memory of 3816 4984 d7b7879e0c28036feeb864c103a95a72_JaffaCakes118.exe 99 PID 4984 wrote to memory of 3816 4984 d7b7879e0c28036feeb864c103a95a72_JaffaCakes118.exe 99 PID 4552 wrote to memory of 4892 4552 morewsat.exe 103 PID 4552 wrote to memory of 4892 4552 morewsat.exe 103 PID 4552 wrote to memory of 4892 4552 morewsat.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7b7879e0c28036feeb864c103a95a72_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d7b7879e0c28036feeb864c103a95a72_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\d7b7879e0c28036feeb864c103a95a72_JaffaCakes118.exe--8484646f2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3828,i,6510295916244954942,10164894160290787457,262144 --variations-seed-version --mojo-platform-channel-handle=3816 /prefetch:81⤵PID:1160
-
C:\Windows\SysWOW64\morewsat.exe"C:\Windows\SysWOW64\morewsat.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\SysWOW64\morewsat.exe--e92a87d62⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4892
-