Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 04:26
Static task
static1
Behavioral task
behavioral1
Sample
d99bc763c0b30ada4d6ddc18da4e6dae_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d99bc763c0b30ada4d6ddc18da4e6dae_JaffaCakes118.exe
-
Size
188KB
-
MD5
d99bc763c0b30ada4d6ddc18da4e6dae
-
SHA1
ed4983bc2dc4ca54af3b2088feac187cc111875f
-
SHA256
09bbbeda2f48025e393ed72bdd3e4282372a4ac1390c05a00212a1da1cf49b93
-
SHA512
1a8d5522471ccbe883a4f2dbdd07313923be898fbc69ed2a79f775384ca44ff721be181f3ad274f5932e48a229db81fd233f441ae3b77a8370846c4209e43ca8
-
SSDEEP
3072:hOVMknusUlbyad72ZyAK2KfcNyQTowN19oJSc/J2puWtGzynEJE:QUBZvDIf8wN19O/ApFtGv
Malware Config
Extracted
emotet
Epoch3
118.243.83.70:80
5.189.168.53:8080
162.241.41.111:7080
190.85.46.52:7080
95.216.205.155:8080
50.116.78.109:8080
54.38.143.245:8080
113.160.248.110:80
115.176.16.221:80
223.17.215.76:80
202.188.218.82:80
172.96.190.154:8080
139.59.12.63:8080
181.95.133.104:80
74.208.173.91:8080
202.166.170.43:80
185.142.236.163:443
198.57.203.63:8080
185.86.148.68:443
88.247.58.26:80
67.121.104.51:20
167.71.227.113:8080
117.247.235.44:80
37.187.100.220:7080
75.127.14.170:8080
45.177.120.37:8080
79.133.6.236:8080
178.33.167.120:8080
179.5.118.12:80
113.161.148.81:80
14.241.182.160:80
180.26.62.115:443
190.194.12.132:80
187.189.66.200:8080
5.79.70.250:8080
37.46.129.215:8080
126.126.139.26:443
76.18.16.210:80
78.114.175.216:80
202.153.220.157:80
192.241.220.183:8080
103.133.66.57:443
220.147.247.145:80
116.202.10.123:8080
192.210.217.94:8080
46.32.229.152:8080
37.205.9.252:7080
190.101.48.116:80
41.185.29.128:8080
46.105.131.68:8080
113.193.239.51:443
119.92.77.17:80
162.144.42.60:8080
139.59.61.215:443
41.212.89.128:80
181.137.229.1:80
185.208.226.142:8080
103.93.220.182:80
192.163.221.191:8080
103.80.51.61:8080
103.48.68.173:80
138.201.45.2:8080
86.57.216.23:80
36.91.44.183:80
103.229.73.17:8080
182.227.240.189:443
91.75.75.46:80
37.210.220.95:80
182.253.83.234:7080
128.106.187.110:80
58.27.215.3:8080
157.245.138.101:7080
190.190.15.20:80
115.79.195.246:80
77.74.78.80:443
195.201.56.70:8080
203.153.216.178:7080
8.4.9.137:8080
2.144.244.204:80
113.156.82.32:80
120.51.34.254:80
80.200.62.81:20
200.120.241.238:80
91.83.93.103:443
157.7.164.178:8081
181.122.154.240:80
143.95.101.72:8080
115.78.11.155:80
51.38.201.19:7080
60.125.114.64:443
49.243.9.118:80
189.150.209.206:80
172.105.78.244:8080
Signatures
-
resource yara_rule behavioral2/memory/1316-0-0x0000000000B80000-0x0000000000B8F000-memory.dmp emotet behavioral2/memory/1316-1-0x0000000002230000-0x0000000002242000-memory.dmp emotet behavioral2/memory/1316-5-0x0000000002250000-0x0000000002260000-memory.dmp emotet -
Executes dropped EXE 1 IoCs
pid Process 2320 wincredprovider.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\KBDINBE1\wincredprovider.exe d99bc763c0b30ada4d6ddc18da4e6dae_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wincredprovider.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d99bc763c0b30ada4d6ddc18da4e6dae_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2320 wincredprovider.exe 2320 wincredprovider.exe 2320 wincredprovider.exe 2320 wincredprovider.exe 2320 wincredprovider.exe 2320 wincredprovider.exe 2320 wincredprovider.exe 2320 wincredprovider.exe 2320 wincredprovider.exe 2320 wincredprovider.exe 2320 wincredprovider.exe 2320 wincredprovider.exe 2320 wincredprovider.exe 2320 wincredprovider.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1316 d99bc763c0b30ada4d6ddc18da4e6dae_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1316 d99bc763c0b30ada4d6ddc18da4e6dae_JaffaCakes118.exe 1316 d99bc763c0b30ada4d6ddc18da4e6dae_JaffaCakes118.exe 2320 wincredprovider.exe 2320 wincredprovider.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1316 wrote to memory of 2320 1316 d99bc763c0b30ada4d6ddc18da4e6dae_JaffaCakes118.exe 84 PID 1316 wrote to memory of 2320 1316 d99bc763c0b30ada4d6ddc18da4e6dae_JaffaCakes118.exe 84 PID 1316 wrote to memory of 2320 1316 d99bc763c0b30ada4d6ddc18da4e6dae_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\d99bc763c0b30ada4d6ddc18da4e6dae_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d99bc763c0b30ada4d6ddc18da4e6dae_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\KBDINBE1\wincredprovider.exe"C:\Windows\SysWOW64\KBDINBE1\wincredprovider.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
188KB
MD5d99bc763c0b30ada4d6ddc18da4e6dae
SHA1ed4983bc2dc4ca54af3b2088feac187cc111875f
SHA25609bbbeda2f48025e393ed72bdd3e4282372a4ac1390c05a00212a1da1cf49b93
SHA5121a8d5522471ccbe883a4f2dbdd07313923be898fbc69ed2a79f775384ca44ff721be181f3ad274f5932e48a229db81fd233f441ae3b77a8370846c4209e43ca8