Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16-09-2024 08:46
Behavioral task
behavioral1
Sample
e467e386d20f45991b9620b4b762556c_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e467e386d20f45991b9620b4b762556c_JaffaCakes118.exe
-
Size
78KB
-
MD5
e467e386d20f45991b9620b4b762556c
-
SHA1
bf386a9fef1cf1eef6ac860b184ba5618ba212d9
-
SHA256
629f1340192caf21b745cf7848e6f806a559fd3f80a347a4794825c2a1e31c91
-
SHA512
e48be184a68524f2834cf8f16cd50ef34b46f3767768a2e6587d721c3a72039ee1bd7c02e979ff5641e87925dbc010ae12506d347a9d8c5a341720554b261724
-
SSDEEP
1536:nQ14LR8spFrd2kxP9GkYsPHmmXZxhDVSQo/l7xmGzFBnO2i8sVJTcWP:Q+8sLd2kJ9GSZjhSz/l7cGhE2iJ33
Malware Config
Extracted
emotet
Epoch2
45.79.188.67:8080
77.237.248.136:8080
185.142.236.163:443
190.108.228.48:990
119.15.153.237:80
31.12.67.62:7080
80.11.163.139:21
190.226.44.20:21
45.33.49.124:443
103.97.95.218:143
187.144.189.58:50000
211.63.71.72:8080
182.76.6.2:8080
138.201.140.110:8080
190.145.67.134:8090
169.239.182.217:8080
46.105.131.87:80
78.24.219.147:8080
91.205.215.66:8080
85.104.59.244:20
80.11.163.139:443
85.106.1.166:50000
188.166.253.46:8080
78.188.105.159:21
45.123.3.54:443
178.254.6.27:7080
103.255.150.84:80
190.211.207.11:443
190.106.97.230:443
186.75.241.230:80
159.65.25.128:8080
201.251.43.69:8080
181.143.53.227:21
186.4.172.5:8080
41.220.119.246:80
5.196.74.210:8080
47.41.213.2:22
186.4.172.5:443
142.44.162.209:8080
87.230.19.21:8080
92.222.125.16:7080
217.160.182.191:8080
212.71.234.16:8080
92.222.216.44:8080
182.176.106.43:995
83.136.245.190:8080
86.98.25.30:53
27.147.163.188:8080
199.19.237.192:80
87.106.139.101:8080
178.79.161.166:443
63.142.253.122:8080
88.247.163.44:80
179.32.19.219:22
24.51.106.145:21
87.106.136.232:8080
186.4.172.5:20
190.186.203.55:80
190.228.72.244:53
185.94.252.13:443
95.128.43.213:8080
144.139.247.220:80
200.71.148.138:8080
94.205.247.10:80
206.189.98.125:8080
104.236.246.93:8080
217.145.83.44:80
101.187.237.217:20
190.53.135.159:21
149.202.153.252:8080
92.233.128.13:143
190.18.146.70:80
104.131.11.150:8080
189.209.217.49:80
222.214.218.192:8080
124.240.198.66:80
149.167.86.174:990
136.243.177.26:8080
62.75.187.192:8080
88.156.97.210:80
37.157.194.134:443
181.143.194.138:443
182.176.132.213:8090
31.172.240.91:8080
173.212.203.26:8080
Signatures
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 lumberhistory.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE lumberhistory.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies lumberhistory.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 lumberhistory.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e467e386d20f45991b9620b4b762556c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e467e386d20f45991b9620b4b762556c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lumberhistory.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lumberhistory.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix lumberhistory.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" lumberhistory.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" lumberhistory.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 3856 lumberhistory.exe 3856 lumberhistory.exe 3856 lumberhistory.exe 3856 lumberhistory.exe 3856 lumberhistory.exe 3856 lumberhistory.exe 3856 lumberhistory.exe 3856 lumberhistory.exe 3856 lumberhistory.exe 3856 lumberhistory.exe 3856 lumberhistory.exe 3856 lumberhistory.exe 3856 lumberhistory.exe 3856 lumberhistory.exe 3856 lumberhistory.exe 3856 lumberhistory.exe 3856 lumberhistory.exe 3856 lumberhistory.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 332 e467e386d20f45991b9620b4b762556c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1648 wrote to memory of 332 1648 e467e386d20f45991b9620b4b762556c_JaffaCakes118.exe 82 PID 1648 wrote to memory of 332 1648 e467e386d20f45991b9620b4b762556c_JaffaCakes118.exe 82 PID 1648 wrote to memory of 332 1648 e467e386d20f45991b9620b4b762556c_JaffaCakes118.exe 82 PID 3040 wrote to memory of 3856 3040 lumberhistory.exe 88 PID 3040 wrote to memory of 3856 3040 lumberhistory.exe 88 PID 3040 wrote to memory of 3856 3040 lumberhistory.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\e467e386d20f45991b9620b4b762556c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e467e386d20f45991b9620b4b762556c_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\e467e386d20f45991b9620b4b762556c_JaffaCakes118.exe--6c0216292⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:332
-
-
C:\Windows\SysWOW64\lumberhistory.exe"C:\Windows\SysWOW64\lumberhistory.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\lumberhistory.exe--c998729f2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:3856
-