Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    127s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/09/2024, 06:30

General

  • Target

    d7b7879e0c28036feeb864c103a95a72_JaffaCakes118.exe

  • Size

    330KB

  • MD5

    d7b7879e0c28036feeb864c103a95a72

  • SHA1

    d69e28e3786eb960eea26ffaee46f67ec5f978cb

  • SHA256

    557f14fbb46192d0d95134d84963c70f22f81757f41200c2dc9cafcbaa7435fe

  • SHA512

    573b1eeee8fd2d03fe9f6ccab4868f9941a537cb3d09fe588106f7daf3d839aa38160f6314bf99071bac288795f4e1d6831118c0ea8e31d6e9cd4612096188b7

  • SSDEEP

    6144:NNXIq0JjQba44/qmsuBS1UURwdBPUVw3ejO+gGrRnOs6:rXzxbjmJBS1oPJOS+gGr2

Malware Config

Extracted

Family

emotet

Botnet

Epoch2

C2

173.91.11.142:80

47.6.15.79:80

47.6.15.79:443

37.59.24.177:8080

66.34.201.20:7080

108.179.206.219:8080

45.56.88.91:443

101.187.134.207:443

1.33.230.137:80

110.143.57.109:80

108.191.2.72:80

47.156.70.145:80

167.71.10.37:8080

190.226.44.20:21

74.105.102.97:8080

190.147.215.53:22

24.45.193.161:7080

70.175.171.251:80

138.59.177.106:443

12.176.19.218:80

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d7b7879e0c28036feeb864c103a95a72_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d7b7879e0c28036feeb864c103a95a72_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4984
    • C:\Users\Admin\AppData\Local\Temp\d7b7879e0c28036feeb864c103a95a72_JaffaCakes118.exe
      --8484646f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of SetWindowsHookEx
      PID:3816
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3828,i,6510295916244954942,10164894160290787457,262144 --variations-seed-version --mojo-platform-channel-handle=3816 /prefetch:8
    1⤵
      PID:1160
    • C:\Windows\SysWOW64\morewsat.exe
      "C:\Windows\SysWOW64\morewsat.exe"
      1⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4552
      • C:\Windows\SysWOW64\morewsat.exe
        --e92a87d6
        2⤵
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:4892

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3816-6-0x0000000002150000-0x0000000002167000-memory.dmp

      Filesize

      92KB

    • memory/3816-16-0x0000000000400000-0x0000000000459000-memory.dmp

      Filesize

      356KB

    • memory/4552-11-0x0000000000E00000-0x0000000000E17000-memory.dmp

      Filesize

      92KB

    • memory/4892-17-0x0000000000720000-0x0000000000737000-memory.dmp

      Filesize

      92KB

    • memory/4984-0-0x0000000002290000-0x00000000022A7000-memory.dmp

      Filesize

      92KB

    • memory/4984-2-0x0000000002270000-0x0000000002281000-memory.dmp

      Filesize

      68KB