Analysis
-
max time kernel
130s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 22:55
Static task
static1
Behavioral task
behavioral1
Sample
ff7156dcfa66a4e7094bc5c199a9da43_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ff7156dcfa66a4e7094bc5c199a9da43_JaffaCakes118.exe
-
Size
212KB
-
MD5
ff7156dcfa66a4e7094bc5c199a9da43
-
SHA1
ceb7c14b5638f2b6143b0fa6e9a9cc427ed7aa1f
-
SHA256
0337c585532a4a3cbed48602fe42563e965b8d853432391633e1da888f1946e3
-
SHA512
38fd76a3dac84315b92b11b94f6262cf18be78f046de77ce7228e1f3ef8c9f2162662cc6981434954d3f68176a7f67e54f4904b72800ce130d65d0aeed498a41
-
SSDEEP
3072:0izbxqLRv2ZCgg1y1t3QoqVePUQGTbgYd/XsLlCP2wj:0Oq55h10JQpeJGT8Yd/X8lS2u
Malware Config
Extracted
emotet
Epoch1
187.144.236.211:443
95.219.199.225:80
125.230.36.147:443
104.236.137.72:8080
172.104.233.225:8080
213.189.36.51:8080
85.234.143.94:8080
2.38.99.79:80
200.113.106.18:80
181.135.153.203:443
201.163.74.202:443
185.86.148.222:8080
189.173.113.67:443
68.183.170.114:8080
187.190.49.92:443
181.231.62.54:80
134.209.214.126:8080
87.118.70.69:8080
47.187.70.124:443
82.196.15.205:8080
190.146.131.105:8080
80.85.87.122:8080
163.172.40.218:7080
190.186.164.23:80
87.106.77.40:7080
69.163.33.84:8080
201.190.133.235:8080
142.127.57.63:8080
190.16.101.10:80
68.183.190.199:8080
62.75.160.178:8080
91.205.215.57:7080
96.20.84.254:7080
181.198.203.45:443
217.199.160.224:8080
186.1.41.111:443
144.139.56.105:80
190.210.184.138:995
46.28.111.142:7080
202.226.238.55:80
200.124.225.32:80
190.4.50.26:80
45.79.95.107:443
5.196.35.138:7080
81.213.215.216:50000
186.68.48.204:443
77.241.53.234:80
200.123.101.90:80
154.120.227.206:8080
190.102.226.91:80
203.25.159.3:8080
178.79.163.131:8080
88.250.223.190:8080
190.17.42.79:80
201.213.32.59:80
191.103.76.34:443
207.154.204.40:8080
186.15.83.52:8080
119.59.124.163:8080
51.255.165.160:8080
159.203.204.126:8080
91.83.93.124:7080
149.62.173.247:8080
212.71.237.140:8080
203.130.0.69:80
109.169.86.13:8080
186.0.68.43:8443
181.36.42.205:443
62.75.143.100:7080
77.55.211.77:8080
14.160.93.230:80
200.58.83.179:80
190.195.129.227:8090
125.99.61.162:7080
86.142.102.191:8443
142.93.114.137:8080
121.175.14.59:990
190.97.30.167:990
104.131.58.132:8080
50.28.51.143:8080
190.38.14.52:80
183.82.97.25:80
46.101.212.195:8080
91.204.163.19:8090
86.42.166.147:80
139.5.237.27:443
78.15.114.100:80
181.61.143.177:80
182.48.194.6:8090
138.68.106.4:7080
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat groupmalert.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff7156dcfa66a4e7094bc5c199a9da43_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff7156dcfa66a4e7094bc5c199a9da43_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language groupmalert.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language groupmalert.exe -
Modifies data under HKEY_USERS 21 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{ECCB368C-2ACD-4C95-8D23-3AE13CFBD4A1}\ce-8d-06-b5-65-54 groupmalert.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ce-8d-06-b5-65-54\WpadDecisionReason = "1" groupmalert.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings groupmalert.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00ba000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 groupmalert.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{ECCB368C-2ACD-4C95-8D23-3AE13CFBD4A1}\WpadDecisionTime = 604e74c6c212db01 groupmalert.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" groupmalert.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 groupmalert.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{ECCB368C-2ACD-4C95-8D23-3AE13CFBD4A1}\WpadDecision = "0" groupmalert.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" groupmalert.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" groupmalert.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad groupmalert.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{ECCB368C-2ACD-4C95-8D23-3AE13CFBD4A1}\WpadDecisionReason = "1" groupmalert.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{ECCB368C-2ACD-4C95-8D23-3AE13CFBD4A1}\WpadNetworkName = "Network 3" groupmalert.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings groupmalert.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 groupmalert.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix groupmalert.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ce-8d-06-b5-65-54 groupmalert.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ce-8d-06-b5-65-54\WpadDecisionTime = 604e74c6c212db01 groupmalert.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ce-8d-06-b5-65-54\WpadDecision = "0" groupmalert.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections groupmalert.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{ECCB368C-2ACD-4C95-8D23-3AE13CFBD4A1} groupmalert.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2092 groupmalert.exe 2092 groupmalert.exe 2092 groupmalert.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2344 ff7156dcfa66a4e7094bc5c199a9da43_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2948 ff7156dcfa66a4e7094bc5c199a9da43_JaffaCakes118.exe 2344 ff7156dcfa66a4e7094bc5c199a9da43_JaffaCakes118.exe 2976 groupmalert.exe 2092 groupmalert.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2948 wrote to memory of 2344 2948 ff7156dcfa66a4e7094bc5c199a9da43_JaffaCakes118.exe 31 PID 2948 wrote to memory of 2344 2948 ff7156dcfa66a4e7094bc5c199a9da43_JaffaCakes118.exe 31 PID 2948 wrote to memory of 2344 2948 ff7156dcfa66a4e7094bc5c199a9da43_JaffaCakes118.exe 31 PID 2948 wrote to memory of 2344 2948 ff7156dcfa66a4e7094bc5c199a9da43_JaffaCakes118.exe 31 PID 2976 wrote to memory of 2092 2976 groupmalert.exe 33 PID 2976 wrote to memory of 2092 2976 groupmalert.exe 33 PID 2976 wrote to memory of 2092 2976 groupmalert.exe 33 PID 2976 wrote to memory of 2092 2976 groupmalert.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff7156dcfa66a4e7094bc5c199a9da43_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ff7156dcfa66a4e7094bc5c199a9da43_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\ff7156dcfa66a4e7094bc5c199a9da43_JaffaCakes118.exe--eeb781d12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:2344
-
-
C:\Windows\SysWOW64\groupmalert.exe"C:\Windows\SysWOW64\groupmalert.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\groupmalert.exe--2a52c7042⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2092
-