Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
10-09-2024 15:59
Static task
static1
Behavioral task
behavioral1
Sample
d88a71cf700ccdccb572a41215010845_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d88a71cf700ccdccb572a41215010845_JaffaCakes118.exe
-
Size
667KB
-
MD5
d88a71cf700ccdccb572a41215010845
-
SHA1
3387e73090c34f5361a2745fd5844cde4b4705f0
-
SHA256
02f7ccc34e66684b5b630f72f77f2c8d2df500cfc975280f53e841390531268b
-
SHA512
3118c51a085205ecf03a63d211264c4a756dbd4bc49bb9e800678a8504edd9efc5a340fc8c380f836e78b22e85990b8e33d20635df29d6657e71f5b3d7c4ae85
-
SSDEEP
12288:6+JJG//twCZ1CFy6jpcFnRO6QuiCDuBMoCkazA:6+J6/twC1N6jiVk6Quix4w
Malware Config
Extracted
emotet
Epoch2
104.193.103.61:80
104.131.123.136:443
5.196.108.189:8080
121.124.124.40:7080
87.106.139.101:8080
213.196.135.145:80
50.35.17.13:80
38.18.235.242:80
24.43.32.186:80
82.80.155.43:80
103.86.49.11:8080
113.61.66.94:80
24.137.76.62:80
187.49.206.134:80
42.200.107.142:80
24.179.13.119:80
93.147.212.206:80
108.46.29.236:80
105.186.233.33:80
37.139.21.175:8080
61.19.246.238:443
97.82.79.83:80
78.188.106.53:443
168.235.67.138:7080
83.169.36.251:8080
89.216.122.92:80
176.111.60.55:8080
181.169.34.190:80
118.83.154.64:443
140.186.212.146:80
139.59.60.244:8080
174.106.122.139:80
194.187.133.160:443
62.30.7.67:443
68.252.26.78:80
75.139.38.211:80
130.0.132.242:80
172.104.97.173:8080
85.152.162.105:80
74.208.45.104:8080
71.15.245.148:8080
139.162.60.124:8080
62.75.141.82:80
203.153.216.189:7080
91.211.88.52:7080
96.249.236.156:443
95.213.236.64:8080
66.65.136.14:80
104.131.44.150:8080
91.146.156.228:80
79.98.24.39:8080
174.45.13.118:80
157.245.99.39:8080
80.241.255.202:8080
71.72.196.159:80
120.150.60.189:80
220.245.198.194:80
121.7.31.214:80
85.96.199.93:80
67.10.155.92:80
109.74.5.95:8080
188.219.31.12:80
162.241.242.173:8080
110.145.77.103:80
78.24.219.147:8080
47.144.21.12:443
139.99.158.11:443
110.142.236.207:80
94.23.237.171:443
50.91.114.38:80
76.175.162.101:80
46.105.131.79:8080
181.169.235.7:80
87.106.136.232:8080
5.39.91.110:7080
24.43.99.75:80
104.131.11.150:443
139.162.108.71:8080
209.141.54.221:8080
124.41.215.226:80
123.176.25.234:80
137.59.187.107:8080
216.139.123.119:80
94.200.114.161:80
79.137.83.50:443
5.196.74.210:8080
104.236.246.93:8080
137.119.36.33:80
37.187.72.193:8080
172.91.208.86:80
142.112.10.95:20
134.209.36.254:8080
190.240.194.77:443
1.221.254.82:80
185.94.252.104:443
Signatures
-
resource yara_rule behavioral2/memory/2512-7-0x0000000000610000-0x000000000061F000-memory.dmp emotet behavioral2/memory/2512-0-0x0000000000740000-0x0000000000752000-memory.dmp emotet behavioral2/memory/2512-4-0x0000000000760000-0x0000000000770000-memory.dmp emotet behavioral2/memory/2576-14-0x0000000002140000-0x0000000002150000-memory.dmp emotet behavioral2/memory/2576-10-0x0000000000680000-0x0000000000692000-memory.dmp emotet -
Executes dropped EXE 1 IoCs
pid Process 2576 WerFaultSecure.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\KBDBASH\WerFaultSecure.exe d88a71cf700ccdccb572a41215010845_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d88a71cf700ccdccb572a41215010845_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WerFaultSecure.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 2576 WerFaultSecure.exe 2576 WerFaultSecure.exe 2576 WerFaultSecure.exe 2576 WerFaultSecure.exe 2576 WerFaultSecure.exe 2576 WerFaultSecure.exe 2576 WerFaultSecure.exe 2576 WerFaultSecure.exe 2576 WerFaultSecure.exe 2576 WerFaultSecure.exe 2576 WerFaultSecure.exe 2576 WerFaultSecure.exe 2576 WerFaultSecure.exe 2576 WerFaultSecure.exe 2576 WerFaultSecure.exe 2576 WerFaultSecure.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2512 d88a71cf700ccdccb572a41215010845_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2576 2512 d88a71cf700ccdccb572a41215010845_JaffaCakes118.exe 84 PID 2512 wrote to memory of 2576 2512 d88a71cf700ccdccb572a41215010845_JaffaCakes118.exe 84 PID 2512 wrote to memory of 2576 2512 d88a71cf700ccdccb572a41215010845_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\d88a71cf700ccdccb572a41215010845_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d88a71cf700ccdccb572a41215010845_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\KBDBASH\WerFaultSecure.exe"C:\Windows\SysWOW64\KBDBASH\WerFaultSecure.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
667KB
MD5d88a71cf700ccdccb572a41215010845
SHA13387e73090c34f5361a2745fd5844cde4b4705f0
SHA25602f7ccc34e66684b5b630f72f77f2c8d2df500cfc975280f53e841390531268b
SHA5123118c51a085205ecf03a63d211264c4a756dbd4bc49bb9e800678a8504edd9efc5a340fc8c380f836e78b22e85990b8e33d20635df29d6657e71f5b3d7c4ae85