Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
17-09-2024 00:27
Static task
static1
Behavioral task
behavioral1
Sample
e5d60d5343d093fc02110d5d90202f4c_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e5d60d5343d093fc02110d5d90202f4c_JaffaCakes118.exe
-
Size
792KB
-
MD5
e5d60d5343d093fc02110d5d90202f4c
-
SHA1
907b82830d9ad86097d8be972d1ed6eb70cff438
-
SHA256
e4ae9602b25447d12b6b9d5cd9d62ce10f0fd8601d8578fff1fff06d85466f0e
-
SHA512
53bd0f092837226d4f83212d3dcea039aa320a65b779c420572b7b47721df834e74ead1a0555674c2b24f0cb77425c6d3231bf4f40a89bc0af4b5d8a5bedb3a2
-
SSDEEP
12288:vfLZ6TmNPhKBEHvoxur/QgkFhqociZhj66kUXm9zzMVvL4vHOBZ:IBKUI/d4K+hjzXBd0
Malware Config
Extracted
emotet
Epoch3
75.139.38.211:80
74.207.230.187:8080
115.79.195.246:80
143.95.101.72:8080
179.5.118.12:80
181.134.9.162:80
78.188.170.128:80
178.33.167.120:8080
190.164.75.175:80
201.214.108.231:80
46.32.229.152:8080
77.74.78.80:443
157.7.164.178:8081
181.113.229.139:443
220.128.125.18:80
192.210.217.94:8080
46.49.124.53:80
185.142.236.163:443
203.153.216.178:7080
45.118.136.92:8080
37.208.106.146:8080
74.208.173.91:8080
37.46.129.215:8080
87.106.231.60:8080
41.185.29.128:8080
24.157.25.203:80
212.156.133.218:80
181.164.110.7:80
140.207.113.106:443
37.70.131.107:80
190.63.7.166:8080
144.139.91.187:80
139.59.12.63:8080
80.211.32.88:8080
113.161.148.81:80
216.75.37.196:8080
78.189.111.208:443
195.201.56.70:8080
192.241.220.183:8080
105.209.239.55:80
50.116.78.109:8080
190.55.233.156:80
91.83.93.103:443
75.127.14.170:8080
212.112.113.235:80
181.167.35.84:80
177.144.130.105:443
211.20.154.102:80
190.171.153.139:80
192.163.221.191:8080
187.207.207.16:80
81.214.253.80:443
163.172.107.70:8080
203.153.216.182:7080
87.252.100.28:80
113.160.180.109:80
51.38.201.19:7080
46.105.131.68:8080
190.111.215.4:8080
Signatures
-
resource yara_rule behavioral2/memory/1208-0-0x0000000002310000-0x000000000231C000-memory.dmp emotet behavioral2/memory/1208-4-0x0000000002300000-0x0000000002309000-memory.dmp emotet behavioral2/memory/4472-9-0x00000000020E0000-0x00000000020EC000-memory.dmp emotet behavioral2/memory/4472-13-0x00000000020E0000-0x00000000020EC000-memory.dmp emotet -
Executes dropped EXE 1 IoCs
pid Process 4472 setupcl.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\KBDHAU\setupcl.exe e5d60d5343d093fc02110d5d90202f4c_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5d60d5343d093fc02110d5d90202f4c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setupcl.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 4472 setupcl.exe 4472 setupcl.exe 4472 setupcl.exe 4472 setupcl.exe 4472 setupcl.exe 4472 setupcl.exe 4472 setupcl.exe 4472 setupcl.exe 4472 setupcl.exe 4472 setupcl.exe 4472 setupcl.exe 4472 setupcl.exe 4472 setupcl.exe 4472 setupcl.exe 4472 setupcl.exe 4472 setupcl.exe 4472 setupcl.exe 4472 setupcl.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1208 e5d60d5343d093fc02110d5d90202f4c_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1208 e5d60d5343d093fc02110d5d90202f4c_JaffaCakes118.exe 1208 e5d60d5343d093fc02110d5d90202f4c_JaffaCakes118.exe 4472 setupcl.exe 4472 setupcl.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1208 wrote to memory of 4472 1208 e5d60d5343d093fc02110d5d90202f4c_JaffaCakes118.exe 87 PID 1208 wrote to memory of 4472 1208 e5d60d5343d093fc02110d5d90202f4c_JaffaCakes118.exe 87 PID 1208 wrote to memory of 4472 1208 e5d60d5343d093fc02110d5d90202f4c_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5d60d5343d093fc02110d5d90202f4c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e5d60d5343d093fc02110d5d90202f4c_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\SysWOW64\KBDHAU\setupcl.exe"C:\Windows\SysWOW64\KBDHAU\setupcl.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
792KB
MD5e5d60d5343d093fc02110d5d90202f4c
SHA1907b82830d9ad86097d8be972d1ed6eb70cff438
SHA256e4ae9602b25447d12b6b9d5cd9d62ce10f0fd8601d8578fff1fff06d85466f0e
SHA51253bd0f092837226d4f83212d3dcea039aa320a65b779c420572b7b47721df834e74ead1a0555674c2b24f0cb77425c6d3231bf4f40a89bc0af4b5d8a5bedb3a2