Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 12:38
Static task
static1
Behavioral task
behavioral1
Sample
fc50cc6a7c5dce83bac1d89769eed9b0_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
fc50cc6a7c5dce83bac1d89769eed9b0_JaffaCakes118.exe
-
Size
599KB
-
MD5
fc50cc6a7c5dce83bac1d89769eed9b0
-
SHA1
85b3ec64bafe9cce78f42f9739dc43a66e46b319
-
SHA256
1d0c3529617e1fec76eeee481ea39208607c6d883ed4ae992db72e702a139c15
-
SHA512
b74137f01011c0e3ec40807f992e9295ddae3ac3ae90ed18937b4188c077d6f480211cc671da00b70287896ada4a76cddcd35d637e27cc79e26fc87ea465effb
-
SSDEEP
6144:B2KTpf+Wg90u6GNOyjTRmUMqFyHEkhmD+ZEGVG4tIabGKFujxO3QHefozLPwNUVf:YJ/UyjFmU3ykfGGabGv+caqLmDf
Malware Config
Extracted
emotet
Epoch1
190.217.1.149:80
154.120.227.206:8080
45.56.79.249:443
163.172.40.218:7080
79.143.182.254:8080
190.230.60.129:8080
46.28.111.142:7080
190.182.161.7:8080
186.68.141.218:80
201.163.74.202:443
62.75.143.100:7080
200.57.102.71:8443
41.75.135.93:7080
119.159.150.176:443
46.41.151.103:8080
178.79.163.131:8080
190.10.194.42:8080
104.131.58.132:8080
200.113.106.18:80
186.15.57.7:8080
220.241.38.226:50000
77.245.101.134:8080
82.196.15.205:8080
190.96.118.15:443
207.154.204.40:8080
190.104.253.234:990
181.36.42.205:443
190.120.104.21:443
201.184.41.228:990
181.44.166.242:80
183.82.97.25:80
212.71.237.140:8080
190.146.131.105:8080
201.213.32.59:80
200.30.227.135:80
178.249.187.151:8080
94.183.71.206:7080
217.199.160.224:8080
91.205.215.57:7080
190.230.60.129:80
139.5.237.27:443
91.204.163.19:8090
51.15.8.192:8080
94.177.183.28:8080
86.42.166.147:80
144.139.158.155:80
181.59.253.20:21
77.55.211.77:8080
142.93.114.137:8080
190.97.30.167:990
62.75.160.178:8080
80.85.87.122:8080
109.169.86.13:8080
190.38.14.52:80
186.1.41.111:443
138.68.106.4:7080
186.0.95.172:80
45.79.95.107:443
119.59.124.163:8080
68.183.170.114:8080
181.16.17.210:443
14.160.93.230:80
159.203.204.126:8080
201.190.133.235:8080
86.6.188.121:80
46.101.212.195:8080
87.106.77.40:7080
149.62.173.247:8080
89.188.124.145:443
186.23.132.93:990
181.135.153.203:443
69.163.33.84:8080
200.58.83.179:80
185.86.148.222:8080
185.187.198.10:8080
79.127.57.43:80
91.83.93.124:7080
46.29.183.211:8080
50.28.51.143:8080
5.196.35.138:7080
81.169.140.14:443
203.25.159.3:8080
190.85.152.186:8080
68.183.190.199:8080
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 3264 fc50cc6a7c5dce83bac1d89769eed9b0_JaffaCakes118.exe 2872 fc50cc6a7c5dce83bac1d89769eed9b0_JaffaCakes118.exe 876 boostmetered.exe 4692 boostmetered.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies boostmetered.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 boostmetered.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 boostmetered.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE boostmetered.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc50cc6a7c5dce83bac1d89769eed9b0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language boostmetered.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language boostmetered.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc50cc6a7c5dce83bac1d89769eed9b0_JaffaCakes118.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" boostmetered.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix boostmetered.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" boostmetered.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4692 boostmetered.exe 4692 boostmetered.exe 4692 boostmetered.exe 4692 boostmetered.exe 4692 boostmetered.exe 4692 boostmetered.exe 4692 boostmetered.exe 4692 boostmetered.exe 4692 boostmetered.exe 4692 boostmetered.exe 4692 boostmetered.exe 4692 boostmetered.exe 4692 boostmetered.exe 4692 boostmetered.exe 4692 boostmetered.exe 4692 boostmetered.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2872 fc50cc6a7c5dce83bac1d89769eed9b0_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3264 wrote to memory of 2872 3264 fc50cc6a7c5dce83bac1d89769eed9b0_JaffaCakes118.exe 82 PID 3264 wrote to memory of 2872 3264 fc50cc6a7c5dce83bac1d89769eed9b0_JaffaCakes118.exe 82 PID 3264 wrote to memory of 2872 3264 fc50cc6a7c5dce83bac1d89769eed9b0_JaffaCakes118.exe 82 PID 876 wrote to memory of 4692 876 boostmetered.exe 84 PID 876 wrote to memory of 4692 876 boostmetered.exe 84 PID 876 wrote to memory of 4692 876 boostmetered.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc50cc6a7c5dce83bac1d89769eed9b0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fc50cc6a7c5dce83bac1d89769eed9b0_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\fc50cc6a7c5dce83bac1d89769eed9b0_JaffaCakes118.exe--32101ecc2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2872
-
-
C:\Windows\SysWOW64\boostmetered.exe"C:\Windows\SysWOW64\boostmetered.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\SysWOW64\boostmetered.exe--736018b72⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Crypto\RSA\S-1-5-18\b383383de6c307020e46727a1e601e32_dd06e985-ac7f-4567-b0c7-3752f03c29fc
Filesize50B
MD5e5f21f598543693bef75a70885351301
SHA179fbe7ba977283d9911109d8c396fc3bd05ba348
SHA256356985f057687ad1cbadc2dc4328d77707ae24f79d69df029610954ced99e380
SHA512ddef4d64549a74bfddc5ae95d4f2086f3a524b4d4198347d9688bbcb90d259221a0acccc662db2a3157c1a723fe696f8256a5add0989c959fd39fc1e526888c2
-
Filesize
50KB
MD5703459bd8d07ccff38c590f9cc4d9fcc
SHA18d072e60630bd692685238e201f4c1ff6ec3eb19
SHA25605073229146780ea0b230be9b4b34d48b14758ea2e7a4bfa6e0c754690ed549f
SHA5125a94969770fbb4b1a417646c5bb88a7f9f7dc747af96b33567f10a8971cec3ae673cea4a5494fc7a44de68e48cd6f1d95548e12c33f86a431492378e846c8718