Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 12:38
Static task
static1
Behavioral task
behavioral1
Sample
fc50cc6a7c5dce83bac1d89769eed9b0_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
fc50cc6a7c5dce83bac1d89769eed9b0_JaffaCakes118.exe
-
Size
599KB
-
MD5
fc50cc6a7c5dce83bac1d89769eed9b0
-
SHA1
85b3ec64bafe9cce78f42f9739dc43a66e46b319
-
SHA256
1d0c3529617e1fec76eeee481ea39208607c6d883ed4ae992db72e702a139c15
-
SHA512
b74137f01011c0e3ec40807f992e9295ddae3ac3ae90ed18937b4188c077d6f480211cc671da00b70287896ada4a76cddcd35d637e27cc79e26fc87ea465effb
-
SSDEEP
6144:B2KTpf+Wg90u6GNOyjTRmUMqFyHEkhmD+ZEGVG4tIabGKFujxO3QHefozLPwNUVf:YJ/UyjFmU3ykfGGabGv+caqLmDf
Malware Config
Extracted
emotet
Epoch1
190.217.1.149:80
154.120.227.206:8080
45.56.79.249:443
163.172.40.218:7080
79.143.182.254:8080
190.230.60.129:8080
46.28.111.142:7080
190.182.161.7:8080
186.68.141.218:80
201.163.74.202:443
62.75.143.100:7080
200.57.102.71:8443
41.75.135.93:7080
119.159.150.176:443
46.41.151.103:8080
178.79.163.131:8080
190.10.194.42:8080
104.131.58.132:8080
200.113.106.18:80
186.15.57.7:8080
220.241.38.226:50000
77.245.101.134:8080
82.196.15.205:8080
190.96.118.15:443
207.154.204.40:8080
190.104.253.234:990
181.36.42.205:443
190.120.104.21:443
201.184.41.228:990
181.44.166.242:80
183.82.97.25:80
212.71.237.140:8080
190.146.131.105:8080
201.213.32.59:80
200.30.227.135:80
178.249.187.151:8080
94.183.71.206:7080
217.199.160.224:8080
91.205.215.57:7080
190.230.60.129:80
139.5.237.27:443
91.204.163.19:8090
51.15.8.192:8080
94.177.183.28:8080
86.42.166.147:80
144.139.158.155:80
181.59.253.20:21
77.55.211.77:8080
142.93.114.137:8080
190.97.30.167:990
62.75.160.178:8080
80.85.87.122:8080
109.169.86.13:8080
190.38.14.52:80
186.1.41.111:443
138.68.106.4:7080
186.0.95.172:80
45.79.95.107:443
119.59.124.163:8080
68.183.170.114:8080
181.16.17.210:443
14.160.93.230:80
159.203.204.126:8080
201.190.133.235:8080
86.6.188.121:80
46.101.212.195:8080
87.106.77.40:7080
149.62.173.247:8080
89.188.124.145:443
186.23.132.93:990
181.135.153.203:443
69.163.33.84:8080
200.58.83.179:80
185.86.148.222:8080
185.187.198.10:8080
79.127.57.43:80
91.83.93.124:7080
46.29.183.211:8080
50.28.51.143:8080
5.196.35.138:7080
81.169.140.14:443
203.25.159.3:8080
190.85.152.186:8080
68.183.190.199:8080
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 2672 fc50cc6a7c5dce83bac1d89769eed9b0_JaffaCakes118.exe 2516 fc50cc6a7c5dce83bac1d89769eed9b0_JaffaCakes118.exe 2332 networkboost.exe 3000 networkboost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat networkboost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc50cc6a7c5dce83bac1d89769eed9b0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc50cc6a7c5dce83bac1d89769eed9b0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language networkboost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language networkboost.exe -
Modifies data under HKEY_USERS 21 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" networkboost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings networkboost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 networkboost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3FE1B660-0AAC-4411-A369-CFF60087579F}\f6-aa-d6-2c-57-43 networkboost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings networkboost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 networkboost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad networkboost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00fe000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 networkboost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\f6-aa-d6-2c-57-43 networkboost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\f6-aa-d6-2c-57-43\WpadDecisionTime = e0054a57a311db01 networkboost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix networkboost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" networkboost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\f6-aa-d6-2c-57-43\WpadDecisionReason = "1" networkboost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\f6-aa-d6-2c-57-43\WpadDecision = "0" networkboost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3FE1B660-0AAC-4411-A369-CFF60087579F}\WpadDecisionReason = "1" networkboost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3FE1B660-0AAC-4411-A369-CFF60087579F}\WpadDecisionTime = e0054a57a311db01 networkboost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3FE1B660-0AAC-4411-A369-CFF60087579F} networkboost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3FE1B660-0AAC-4411-A369-CFF60087579F}\WpadDecision = "0" networkboost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3FE1B660-0AAC-4411-A369-CFF60087579F}\WpadNetworkName = "Network 3" networkboost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections networkboost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" networkboost.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3000 networkboost.exe 3000 networkboost.exe 3000 networkboost.exe 3000 networkboost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2516 fc50cc6a7c5dce83bac1d89769eed9b0_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2516 2672 fc50cc6a7c5dce83bac1d89769eed9b0_JaffaCakes118.exe 30 PID 2672 wrote to memory of 2516 2672 fc50cc6a7c5dce83bac1d89769eed9b0_JaffaCakes118.exe 30 PID 2672 wrote to memory of 2516 2672 fc50cc6a7c5dce83bac1d89769eed9b0_JaffaCakes118.exe 30 PID 2672 wrote to memory of 2516 2672 fc50cc6a7c5dce83bac1d89769eed9b0_JaffaCakes118.exe 30 PID 2332 wrote to memory of 3000 2332 networkboost.exe 32 PID 2332 wrote to memory of 3000 2332 networkboost.exe 32 PID 2332 wrote to memory of 3000 2332 networkboost.exe 32 PID 2332 wrote to memory of 3000 2332 networkboost.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc50cc6a7c5dce83bac1d89769eed9b0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fc50cc6a7c5dce83bac1d89769eed9b0_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\fc50cc6a7c5dce83bac1d89769eed9b0_JaffaCakes118.exe--32101ecc2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2516
-
-
C:\Windows\SysWOW64\networkboost.exe"C:\Windows\SysWOW64\networkboost.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\networkboost.exe--bef8ab872⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD59bffcad43809c28e03b11e6b74a03bc6
SHA1ab4d88bc59348d980a1b3ec7f20945556a8388af
SHA2569a5e9a22b8f93a4c38e8c8ea448b43ef51261156c3bfa6d914f5d055f2c140eb
SHA512b563c0a604ca61a926c453cd6d77e2d766dc8b582640f5e99a403406e78ef8724c198f4dda48f5d87e7c641c37098dfef04261d56aa3ccd64dea932088b909f8
-
Filesize
50KB
MD5e225d42975f7a5d0cd99a2451915cc64
SHA1d3dd76999d29a791387c6330c971e337dfcc8d8d
SHA256e676c6845d22728b410a4caa4c4150c0b8140286eacab1e8df8ff9b144ff6ad6
SHA512dd13d521e310a72a31a7a62c1f8fdfdb226740722bcde7206b2a299f6e5ab5139a5dbbc102da5b4103eb65e20d87e9ea21cc43eca037422ac7301f61ba5b3fc9