Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
16-09-2024 17:53
Static task
static1
Behavioral task
behavioral1
Sample
e54e6edff6e9e37da5a3cf3fcce53c41_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e54e6edff6e9e37da5a3cf3fcce53c41_JaffaCakes118.exe
-
Size
667KB
-
MD5
e54e6edff6e9e37da5a3cf3fcce53c41
-
SHA1
02589d586e57a2965f44dbc0dec13c0ab80421f2
-
SHA256
bd029a995190816ab222eadaf666107e3f0cebeea6a1cc2c1b77ec72369f576c
-
SHA512
54f87209f3253561f81fe4f1360e9301f089b95fe390c951b7aa0bc7702f2fd5ca33c15e5dcb1255799f4151f92f78bd1467b2ec1a88071ec95bc95c663b933c
-
SSDEEP
12288:U2JhG//t8C5VCFSoDpaQlHfl6mCiWDaBMFC+oCGsq:U2JC/t8iVNoDgQVN6mCiptPX
Malware Config
Extracted
emotet
Epoch3
116.91.240.96:80
167.71.227.113:8080
190.85.46.52:7080
162.144.42.60:8080
202.166.170.43:80
95.216.205.155:8080
120.51.34.254:80
103.93.220.182:80
111.89.241.139:80
60.125.114.64:443
45.177.120.37:8080
185.86.148.68:443
75.127.14.170:8080
119.92.77.17:80
203.153.216.178:7080
172.96.190.154:8080
179.5.118.12:80
153.229.219.1:443
139.59.12.63:8080
115.79.195.246:80
103.229.73.17:8080
195.201.56.70:8080
190.192.39.136:80
183.77.227.38:80
45.239.204.100:80
192.163.221.191:8080
46.32.229.152:8080
73.55.128.120:80
113.203.238.130:80
138.201.45.2:8080
180.148.4.130:8080
77.74.78.80:443
115.79.59.157:80
91.83.93.103:443
181.80.129.181:80
41.185.29.128:8080
178.33.167.120:8080
185.208.226.142:8080
91.75.75.46:80
86.57.216.23:80
143.95.101.72:8080
118.33.121.37:80
116.202.10.123:8080
103.80.51.61:8080
54.38.143.245:8080
50.116.78.109:8080
128.106.187.110:80
139.59.61.215:443
190.191.171.72:80
58.27.215.3:8080
223.17.215.76:80
37.205.9.252:7080
37.46.129.215:8080
46.105.131.68:8080
192.241.220.183:8080
24.231.51.190:80
113.161.148.81:80
109.206.139.119:80
118.243.83.70:80
185.142.236.163:443
172.105.78.244:8080
185.80.172.199:80
190.194.12.132:80
36.91.44.183:80
200.116.93.61:80
192.210.217.94:8080
93.20.157.143:80
198.57.203.63:8080
78.186.65.230:80
175.103.38.146:80
115.135.158.13:80
113.160.248.110:80
88.247.58.26:80
157.7.164.178:8081
67.121.104.51:20
74.208.173.91:8080
113.156.82.32:80
51.38.201.19:7080
14.241.182.160:80
79.133.6.236:8080
169.1.211.133:80
202.153.220.157:80
8.4.9.137:8080
220.106.127.191:443
5.79.70.250:8080
37.187.100.220:7080
113.193.239.51:443
Signatures
-
resource yara_rule behavioral2/memory/2352-4-0x0000000000560000-0x0000000000570000-memory.dmp emotet behavioral2/memory/2352-7-0x0000000000540000-0x000000000054F000-memory.dmp emotet behavioral2/memory/2352-0-0x0000000000580000-0x0000000000592000-memory.dmp emotet behavioral2/memory/4468-14-0x0000000000660000-0x0000000000670000-memory.dmp emotet behavioral2/memory/4468-10-0x0000000000640000-0x0000000000652000-memory.dmp emotet -
Executes dropped EXE 1 IoCs
pid Process 4468 ntprint.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\KBDLV1\ntprint.exe e54e6edff6e9e37da5a3cf3fcce53c41_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e54e6edff6e9e37da5a3cf3fcce53c41_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntprint.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4468 ntprint.exe 4468 ntprint.exe 4468 ntprint.exe 4468 ntprint.exe 4468 ntprint.exe 4468 ntprint.exe 4468 ntprint.exe 4468 ntprint.exe 4468 ntprint.exe 4468 ntprint.exe 4468 ntprint.exe 4468 ntprint.exe 4468 ntprint.exe 4468 ntprint.exe 4468 ntprint.exe 4468 ntprint.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2352 e54e6edff6e9e37da5a3cf3fcce53c41_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2352 wrote to memory of 4468 2352 e54e6edff6e9e37da5a3cf3fcce53c41_JaffaCakes118.exe 85 PID 2352 wrote to memory of 4468 2352 e54e6edff6e9e37da5a3cf3fcce53c41_JaffaCakes118.exe 85 PID 2352 wrote to memory of 4468 2352 e54e6edff6e9e37da5a3cf3fcce53c41_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\e54e6edff6e9e37da5a3cf3fcce53c41_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e54e6edff6e9e37da5a3cf3fcce53c41_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\KBDLV1\ntprint.exe"C:\Windows\SysWOW64\KBDLV1\ntprint.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4468
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
667KB
MD5e54e6edff6e9e37da5a3cf3fcce53c41
SHA102589d586e57a2965f44dbc0dec13c0ab80421f2
SHA256bd029a995190816ab222eadaf666107e3f0cebeea6a1cc2c1b77ec72369f576c
SHA51254f87209f3253561f81fe4f1360e9301f089b95fe390c951b7aa0bc7702f2fd5ca33c15e5dcb1255799f4151f92f78bd1467b2ec1a88071ec95bc95c663b933c