Analysis
-
max time kernel
135s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 02:31
Static task
static1
Behavioral task
behavioral1
Sample
e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe
-
Size
540KB
-
MD5
e1880c02d31c7c2516de453d9a2b65c8
-
SHA1
446f8e6641f7506956b3911a1bd4baab5ac2b494
-
SHA256
d9c346f01f30a157082337c42002739eed034cfac31e5cd506c3e035030b6125
-
SHA512
47aca2cd91620bc4b06e03a9521480f28182dc76a9cfe4a00326cfc6a6c5f550fffbe0814cb3c7786f5ec5466e09dcc90fc310a582d83ec586a31ca2f082fa3f
-
SSDEEP
6144:ep3L2QXYf/A90xnOXmXDAfQ/FIN8NhwtXj3HiIWJrGlF:z4Yn5xnOXoG+FIYmHu8lF
Malware Config
Extracted
emotet
Epoch3
190.16.101.10:80
190.217.1.149:80
45.56.122.75:80
85.25.92.96:8080
94.177.253.126:80
187.188.166.192:80
192.241.220.183:8080
189.132.130.111:8080
186.109.91.136:80
186.92.11.143:8080
203.99.182.135:443
91.109.5.28:8080
70.32.94.58:8080
70.45.30.28:80
203.99.187.137:443
190.228.212.165:50000
51.38.134.203:8080
203.99.188.11:443
184.82.233.15:80
154.120.227.206:8080
157.7.164.178:8081
190.13.146.47:443
186.146.110.108:8080
162.241.134.130:8080
75.154.163.1:8090
201.217.113.58:8080
178.249.187.150:7080
190.117.206.153:443
152.170.220.95:80
187.143.219.242:8080
144.76.62.10:8080
143.95.101.72:8080
200.55.168.82:20
138.186.179.235:8080
203.99.188.203:990
200.90.86.170:8080
186.84.173.153:80
95.216.207.86:7080
216.70.88.55:8080
212.112.113.235:80
181.61.143.177:80
216.75.37.196:8080
5.189.148.98:8080
187.154.175.124:8080
190.96.118.15:443
113.52.135.33:7080
181.197.2.80:443
190.113.146.128:8080
201.196.15.79:990
83.169.33.157:8080
181.36.42.205:443
176.58.93.123:80
23.253.207.142:8080
138.197.140.163:8080
181.47.235.26:993
185.45.24.254:7080
172.104.70.207:8080
Signatures
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 mobsyncpicture.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE mobsyncpicture.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies mobsyncpicture.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 mobsyncpicture.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mobsyncpicture.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mobsyncpicture.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mobsyncpicture.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mobsyncpicture.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mobsyncpicture.exe -
Modifies registry class 36 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mfccalc.calculator\CLSID\ = "{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}" e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\ProgID e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\ProgID mobsyncpicture.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\ProgID\ = "mfccalc.calculator" mobsyncpicture.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mfccalc.calculator\CLSID mobsyncpicture.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mfccalc.calculator\CLSID\ = "{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}" mobsyncpicture.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\ = "mfccalc.calculator" e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\E1880C~1.EXE" e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mfccalc.calculator\CLSID mobsyncpicture.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\InprocHandler32 mobsyncpicture.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\LocalServer32\ = "C:\\Windows\\SysWOW64\\MOBSYN~1.EXE" mobsyncpicture.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mfccalc.calculator\ = "mfccalc.calculator" e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mfccalc.calculator\CLSID\ = "{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}" mobsyncpicture.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\InprocHandler32 mobsyncpicture.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\InprocHandler32\ = "ole32.dll" mobsyncpicture.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\InprocHandler32 e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mfccalc.calculator\CLSID e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\LocalServer32 mobsyncpicture.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\LocalServer32 e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mfccalc.calculator\CLSID e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\ProgID e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\E1880C~1.EXE" e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7} e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\ProgID\ = "mfccalc.calculator" e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mfccalc.calculator\CLSID\ = "{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}" e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\ProgID\ = "mfccalc.calculator" e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\ProgID\ = "mfccalc.calculator" mobsyncpicture.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mfccalc.calculator e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\InprocHandler32 e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\LocalServer32 e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\ProgID mobsyncpicture.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\InprocHandler32\ = "ole32.dll" e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\InprocHandler32\ = "ole32.dll" mobsyncpicture.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\LocalServer32 mobsyncpicture.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\LocalServer32\ = "C:\\Windows\\SysWOW64\\MOBSYN~1.EXE" mobsyncpicture.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\InprocHandler32\ = "ole32.dll" e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 716 mobsyncpicture.exe 716 mobsyncpicture.exe 716 mobsyncpicture.exe 716 mobsyncpicture.exe 716 mobsyncpicture.exe 716 mobsyncpicture.exe 716 mobsyncpicture.exe 716 mobsyncpicture.exe 716 mobsyncpicture.exe 716 mobsyncpicture.exe 716 mobsyncpicture.exe 716 mobsyncpicture.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4592 e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2984 e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe 2984 e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe 4592 e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe 4592 e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe 5364 mobsyncpicture.exe 5364 mobsyncpicture.exe 716 mobsyncpicture.exe 716 mobsyncpicture.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2984 wrote to memory of 4592 2984 e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe 83 PID 2984 wrote to memory of 4592 2984 e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe 83 PID 2984 wrote to memory of 4592 2984 e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe 83 PID 5364 wrote to memory of 716 5364 mobsyncpicture.exe 89 PID 5364 wrote to memory of 716 5364 mobsyncpicture.exe 89 PID 5364 wrote to memory of 716 5364 mobsyncpicture.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\e1880c02d31c7c2516de453d9a2b65c8_JaffaCakes118.exe--448709e12⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:4592
-
-
C:\Windows\SysWOW64\mobsyncpicture.exe"C:\Windows\SysWOW64\mobsyncpicture.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5364 -
C:\Windows\SysWOW64\mobsyncpicture.exe--764930152⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Crypto\RSA\S-1-5-18\2ef03a69763eed69ac5af7ea9398ce42_ea0aa4d6-aa48-4733-9e64-85ab59ce35b0
Filesize1KB
MD59dda9585826a275297cc1f39c5586655
SHA199428816d846cf9f0c3d1b22d7eeef3586af0768
SHA2567035a419a43b8d6966a75444449b599f550f2a9f02d1da1bc8d3d22437e9e214
SHA512def963e4da41871dd28e1a638cdbab4166a565511754d7d7beb1bd4db6d406bd0dfe802af5044e4279846d0fc8147478c5440754c8fba874f257d070be5314e4
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-4182098368-2521458979-3782681353-1000\0f5007522459c86e95ffcc62f32308f1_ea0aa4d6-aa48-4733-9e64-85ab59ce35b0
Filesize1KB
MD54c045888e7d2be10e0f297c196b2f95c
SHA142cf30c93cec5e8c417e2f78e27bb3decf30ddf3
SHA256019f138d651bb7fcbffb403653be86cd24bbaf979f858ee574dd7fcd03240f36
SHA51271d97cca9943492f8471b229f1deee4d48ca6d2993082d0c398019ac45859e6a91ccaf5aaa151b22e53f7e69926a9708b47748fb991137e5b6aace7e824947da