Analysis
-
max time kernel
139s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
16-09-2024 08:19
Static task
static1
Behavioral task
behavioral1
Sample
e45cac072be637a8b767748d9a4aa225_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
e45cac072be637a8b767748d9a4aa225_JaffaCakes118.exe
-
Size
448KB
-
MD5
e45cac072be637a8b767748d9a4aa225
-
SHA1
3960e4c824cee5e6d52a987622d574af87f86960
-
SHA256
c8de6f317f5e229ddc162a89867520de23a899aeff2e4b43a25cc914aba20ea5
-
SHA512
78377f8dfc6207a4ba5f33b2995da0dc5d01c2b7dbe2f92553295867059aafc6bbd021b6dabf5050db70d0f27676d85da2bbab143034cc7dd4a04ba8e267ee39
-
SSDEEP
12288:SfzaBuiszJbE9mO4sl9kHAOyQkNvOzxr:SbMmO4sl9gR2Ot
Malware Config
Extracted
emotet
Epoch3
71.57.180.213:80
185.86.148.68:443
168.235.82.183:8080
181.113.229.139:443
181.134.9.162:80
217.199.160.224:8080
105.209.235.113:8080
216.75.37.196:8080
97.104.107.190:80
203.153.216.182:7080
107.161.30.122:8080
41.106.96.12:80
202.5.47.71:80
201.235.10.215:80
105.213.67.88:80
115.79.195.246:80
179.5.118.12:80
212.112.113.235:80
139.59.12.63:8080
177.37.81.212:443
81.17.93.134:80
46.32.229.152:8080
66.61.94.36:80
172.96.190.154:8080
176.9.93.82:7080
5.79.70.250:8080
190.212.140.6:80
37.46.129.215:8080
115.165.3.213:80
201.213.177.139:80
187.64.128.197:80
92.24.51.238:80
185.208.226.142:8080
50.116.78.109:8080
46.105.131.68:8080
181.114.114.203:80
190.190.15.20:80
198.57.203.63:8080
188.251.213.180:443
185.142.236.163:443
182.176.95.147:80
143.95.101.72:8080
181.164.110.7:80
113.161.148.81:80
51.38.201.19:7080
31.146.61.34:80
75.139.38.211:80
157.7.164.178:8081
203.153.216.178:7080
212.156.133.218:80
81.214.253.80:443
87.106.231.60:8080
190.164.75.175:80
77.74.78.80:443
179.62.238.49:80
78.189.60.109:443
177.32.8.85:80
195.201.56.70:8080
190.53.144.120:80
75.127.14.170:8080
177.144.130.105:443
178.33.167.120:8080
192.210.217.94:8080
192.241.220.183:8080
188.0.135.237:80
74.208.173.91:8080
182.187.139.200:8080
172.105.78.244:8080
41.185.29.128:8080
197.83.232.19:80
87.252.100.28:80
115.78.11.155:80
192.163.221.191:8080
91.83.93.103:443
139.99.157.213:8080
Signatures
-
resource yara_rule behavioral2/memory/3632-0-0x00000000023E0000-0x00000000023E9000-memory.dmp emotet behavioral2/memory/3632-1-0x00000000024F0000-0x00000000024FC000-memory.dmp emotet behavioral2/memory/4608-7-0x00000000022C0000-0x00000000022CC000-memory.dmp emotet behavioral2/memory/4608-11-0x00000000022C0000-0x00000000022CC000-memory.dmp emotet -
Executes dropped EXE 1 IoCs
pid Process 4608 KBDA3.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\MapConfiguration\KBDA3.exe e45cac072be637a8b767748d9a4aa225_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e45cac072be637a8b767748d9a4aa225_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KBDA3.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4608 KBDA3.exe 4608 KBDA3.exe 4608 KBDA3.exe 4608 KBDA3.exe 4608 KBDA3.exe 4608 KBDA3.exe 4608 KBDA3.exe 4608 KBDA3.exe 4608 KBDA3.exe 4608 KBDA3.exe 4608 KBDA3.exe 4608 KBDA3.exe 4608 KBDA3.exe 4608 KBDA3.exe 4608 KBDA3.exe 4608 KBDA3.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3632 e45cac072be637a8b767748d9a4aa225_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3632 e45cac072be637a8b767748d9a4aa225_JaffaCakes118.exe 3632 e45cac072be637a8b767748d9a4aa225_JaffaCakes118.exe 4608 KBDA3.exe 4608 KBDA3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3632 wrote to memory of 4608 3632 e45cac072be637a8b767748d9a4aa225_JaffaCakes118.exe 86 PID 3632 wrote to memory of 4608 3632 e45cac072be637a8b767748d9a4aa225_JaffaCakes118.exe 86 PID 3632 wrote to memory of 4608 3632 e45cac072be637a8b767748d9a4aa225_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\e45cac072be637a8b767748d9a4aa225_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e45cac072be637a8b767748d9a4aa225_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\SysWOW64\MapConfiguration\KBDA3.exe"C:\Windows\SysWOW64\MapConfiguration\KBDA3.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
448KB
MD5e45cac072be637a8b767748d9a4aa225
SHA13960e4c824cee5e6d52a987622d574af87f86960
SHA256c8de6f317f5e229ddc162a89867520de23a899aeff2e4b43a25cc914aba20ea5
SHA51278377f8dfc6207a4ba5f33b2995da0dc5d01c2b7dbe2f92553295867059aafc6bbd021b6dabf5050db70d0f27676d85da2bbab143034cc7dd4a04ba8e267ee39