Analysis
-
max time kernel
147s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 16:36
Static task
static1
Behavioral task
behavioral1
Sample
f66c59a54de4227b09c1f90e48ab0eb9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f66c59a54de4227b09c1f90e48ab0eb9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f66c59a54de4227b09c1f90e48ab0eb9_JaffaCakes118.exe
-
Size
460KB
-
MD5
f66c59a54de4227b09c1f90e48ab0eb9
-
SHA1
0db13f17f2cc0b7adc9d3d0f002ecd415a85e5a1
-
SHA256
9c8ed4959181511d31b064b4c2db7508126bac27934d9c155e6ecb5665e3ea5d
-
SHA512
d8bd8e918f1fdfce85cb05c939e1e3a1cab235316a57f394c5bd9a4605ba255d6f87071ff7fd48613e7dd20aa6dede6d5c728ba95ec4ec1da3f53bb86aa4e9c6
-
SSDEEP
6144:d8WNXb6O5ZTWcDxKoAS7FXg8k/90x/WvKFqL7sQQyoVbY5KjCJwpWMcL:d8c5WWKg1g8NQvKF4fou5p3
Malware Config
Extracted
emotet
Epoch1
190.158.19.141:80
139.5.237.27:443
201.214.74.71:80
80.240.141.141:7080
185.187.198.10:8080
46.41.134.46:8080
178.249.187.151:8080
217.199.160.224:8080
123.168.4.66:22
201.184.65.229:80
190.221.50.210:8080
119.59.124.163:8080
212.71.237.140:8080
109.169.86.13:8080
190.19.42.131:80
190.230.60.129:80
190.1.37.125:443
62.75.143.100:7080
203.25.159.3:8080
87.106.77.40:7080
5.77.13.70:80
5.196.35.138:7080
46.29.183.211:8080
109.104.79.48:8080
138.68.106.4:7080
50.28.51.143:8080
86.42.166.147:80
46.163.144.228:80
77.55.211.77:8080
46.21.105.59:8080
189.187.141.15:50000
217.113.27.158:443
200.58.171.51:80
89.188.124.145:443
80.85.87.122:8080
187.199.158.226:443
181.230.212.74:80
200.21.90.6:8080
179.62.18.56:443
62.75.160.178:8080
186.83.133.253:8080
186.0.95.172:80
23.92.22.225:7080
190.104.253.234:990
149.62.173.247:8080
119.92.51.40:8080
190.117.206.153:443
71.244.60.230:7080
211.229.116.97:80
151.80.142.33:80
187.235.239.214:8080
51.15.8.192:8080
81.169.140.14:443
187.188.166.192:80
88.250.223.190:8080
114.79.134.129:443
185.86.148.222:8080
71.244.60.231:7080
178.79.163.131:8080
181.188.149.134:80
187.155.233.46:443
181.36.42.205:443
77.245.101.134:8080
170.84.133.72:8443
46.28.111.142:7080
190.38.14.52:80
159.203.204.126:8080
183.82.97.25:80
190.200.64.180:7080
91.83.93.124:7080
181.167.53.209:80
91.205.215.57:7080
79.143.182.254:8080
201.163.74.202:443
189.166.68.89:443
217.199.175.216:8080
200.57.102.71:8443
46.41.151.103:8080
190.230.60.129:8080
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat drawachunk.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2080 set thread context of 1924 2080 f66c59a54de4227b09c1f90e48ab0eb9_JaffaCakes118.exe 30 PID 1784 set thread context of 2424 1784 f66c59a54de4227b09c1f90e48ab0eb9_JaffaCakes118.exe 32 PID 1364 set thread context of 2704 1364 drawachunk.exe 35 PID 2500 set thread context of 2824 2500 drawachunk.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f66c59a54de4227b09c1f90e48ab0eb9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f66c59a54de4227b09c1f90e48ab0eb9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f66c59a54de4227b09c1f90e48ab0eb9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f66c59a54de4227b09c1f90e48ab0eb9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drawachunk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drawachunk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drawachunk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drawachunk.exe -
Modifies data under HKEY_USERS 21 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 drawachunk.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{89B5C84D-E062-40FF-AAE5-6DE8DF79703D}\WpadDecisionTime = 0000742c690fdb01 drawachunk.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 drawachunk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix drawachunk.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" drawachunk.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{89B5C84D-E062-40FF-AAE5-6DE8DF79703D}\WpadDecisionReason = "1" drawachunk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{89B5C84D-E062-40FF-AAE5-6DE8DF79703D}\WpadNetworkName = "Network 3" drawachunk.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9a-95-27-8d-8c-6b\WpadDecisionReason = "1" drawachunk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections drawachunk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings drawachunk.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f016d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 drawachunk.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9a-95-27-8d-8c-6b\WpadDecision = "0" drawachunk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad drawachunk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{89B5C84D-E062-40FF-AAE5-6DE8DF79703D} drawachunk.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{89B5C84D-E062-40FF-AAE5-6DE8DF79703D}\WpadDecision = "0" drawachunk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9a-95-27-8d-8c-6b drawachunk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{89B5C84D-E062-40FF-AAE5-6DE8DF79703D}\9a-95-27-8d-8c-6b drawachunk.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9a-95-27-8d-8c-6b\WpadDecisionTime = 0000742c690fdb01 drawachunk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings drawachunk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" drawachunk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" drawachunk.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2824 drawachunk.exe 2824 drawachunk.exe 2824 drawachunk.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 2080 f66c59a54de4227b09c1f90e48ab0eb9_JaffaCakes118.exe 1784 f66c59a54de4227b09c1f90e48ab0eb9_JaffaCakes118.exe 1364 drawachunk.exe 2500 drawachunk.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2424 f66c59a54de4227b09c1f90e48ab0eb9_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2080 f66c59a54de4227b09c1f90e48ab0eb9_JaffaCakes118.exe 1784 f66c59a54de4227b09c1f90e48ab0eb9_JaffaCakes118.exe 1364 drawachunk.exe 2500 drawachunk.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2080 wrote to memory of 1924 2080 f66c59a54de4227b09c1f90e48ab0eb9_JaffaCakes118.exe 30 PID 2080 wrote to memory of 1924 2080 f66c59a54de4227b09c1f90e48ab0eb9_JaffaCakes118.exe 30 PID 2080 wrote to memory of 1924 2080 f66c59a54de4227b09c1f90e48ab0eb9_JaffaCakes118.exe 30 PID 2080 wrote to memory of 1924 2080 f66c59a54de4227b09c1f90e48ab0eb9_JaffaCakes118.exe 30 PID 2080 wrote to memory of 1924 2080 f66c59a54de4227b09c1f90e48ab0eb9_JaffaCakes118.exe 30 PID 1924 wrote to memory of 1784 1924 f66c59a54de4227b09c1f90e48ab0eb9_JaffaCakes118.exe 31 PID 1924 wrote to memory of 1784 1924 f66c59a54de4227b09c1f90e48ab0eb9_JaffaCakes118.exe 31 PID 1924 wrote to memory of 1784 1924 f66c59a54de4227b09c1f90e48ab0eb9_JaffaCakes118.exe 31 PID 1924 wrote to memory of 1784 1924 f66c59a54de4227b09c1f90e48ab0eb9_JaffaCakes118.exe 31 PID 1784 wrote to memory of 2424 1784 f66c59a54de4227b09c1f90e48ab0eb9_JaffaCakes118.exe 32 PID 1784 wrote to memory of 2424 1784 f66c59a54de4227b09c1f90e48ab0eb9_JaffaCakes118.exe 32 PID 1784 wrote to memory of 2424 1784 f66c59a54de4227b09c1f90e48ab0eb9_JaffaCakes118.exe 32 PID 1784 wrote to memory of 2424 1784 f66c59a54de4227b09c1f90e48ab0eb9_JaffaCakes118.exe 32 PID 1784 wrote to memory of 2424 1784 f66c59a54de4227b09c1f90e48ab0eb9_JaffaCakes118.exe 32 PID 1364 wrote to memory of 2704 1364 drawachunk.exe 35 PID 1364 wrote to memory of 2704 1364 drawachunk.exe 35 PID 1364 wrote to memory of 2704 1364 drawachunk.exe 35 PID 1364 wrote to memory of 2704 1364 drawachunk.exe 35 PID 1364 wrote to memory of 2704 1364 drawachunk.exe 35 PID 2704 wrote to memory of 2500 2704 drawachunk.exe 36 PID 2704 wrote to memory of 2500 2704 drawachunk.exe 36 PID 2704 wrote to memory of 2500 2704 drawachunk.exe 36 PID 2704 wrote to memory of 2500 2704 drawachunk.exe 36 PID 2500 wrote to memory of 2824 2500 drawachunk.exe 37 PID 2500 wrote to memory of 2824 2500 drawachunk.exe 37 PID 2500 wrote to memory of 2824 2500 drawachunk.exe 37 PID 2500 wrote to memory of 2824 2500 drawachunk.exe 37 PID 2500 wrote to memory of 2824 2500 drawachunk.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\f66c59a54de4227b09c1f90e48ab0eb9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f66c59a54de4227b09c1f90e48ab0eb9_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\f66c59a54de4227b09c1f90e48ab0eb9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f66c59a54de4227b09c1f90e48ab0eb9_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\f66c59a54de4227b09c1f90e48ab0eb9_JaffaCakes118.exe--5df3e27b3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\f66c59a54de4227b09c1f90e48ab0eb9_JaffaCakes118.exe--5df3e27b4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2424
-
-
-
-
C:\Windows\SysWOW64\drawachunk.exe"C:\Windows\SysWOW64\drawachunk.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\drawachunk.exe"C:\Windows\SysWOW64\drawachunk.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\drawachunk.exe--1b7154c23⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\drawachunk.exe--1b7154c24⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2824
-
-
-