Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 03:34
Static task
static1
Behavioral task
behavioral1
Sample
ffe0aaa5a58e9e2732dfcf21954cc34a_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ffe0aaa5a58e9e2732dfcf21954cc34a_JaffaCakes118.exe
-
Size
644KB
-
MD5
ffe0aaa5a58e9e2732dfcf21954cc34a
-
SHA1
8819cd5ee0547d6186837ae7b2c006e21e47e76d
-
SHA256
7e6424b06803d1827a54cebfe837aeb14cf9b52f9e04b8ae0ec3cbd0e1cc314a
-
SHA512
30a57d6277f57a639f3742bc7665b48cf21cd73804180422df725106cbc008fb24e895c358faff96d3e17ede9a34b99726e0b8e7d96c120e35ad7595a03d0292
-
SSDEEP
6144:SWL5bs/xDPi1acqBcDd0SnawIDinG/sHuyts3s4AlLkInTH2I3ChtRflGLEh2Heg:9tbsIacruwRTHuSDtkGTvUjEEEVreD
Malware Config
Extracted
emotet
Epoch3
190.93.210.113:80
165.100.148.200:8080
197.94.32.129:8080
45.79.75.232:8080
124.150.175.133:80
164.68.115.146:8080
5.189.148.98:8080
58.93.151.148:80
186.84.173.136:8080
37.70.131.107:80
66.229.161.86:443
188.230.134.205:80
95.216.212.157:8080
189.61.200.9:443
50.116.78.109:8080
23.253.207.142:8080
86.6.123.109:80
190.5.162.204:80
187.250.92.82:80
113.52.135.33:7080
95.216.207.86:7080
182.176.116.139:995
82.79.244.92:80
189.225.211.171:443
46.17.6.116:8080
82.165.15.188:8080
192.210.217.94:8080
174.57.150.13:8080
200.71.112.158:53
58.185.224.18:80
120.51.83.89:443
100.38.11.243:80
108.184.9.44:80
59.158.164.66:443
95.255.140.89:443
51.38.134.203:8080
163.172.97.112:8080
37.59.24.25:8080
154.120.227.190:443
89.215.225.15:80
78.186.102.195:80
41.77.74.214:443
95.9.217.200:8080
191.100.24.201:50000
200.41.121.69:443
192.241.220.183:8080
158.69.167.246:8080
112.186.195.176:80
177.103.240.93:80
119.57.36.54:8080
41.190.148.90:80
210.224.65.117:80
91.117.31.181:80
92.16.222.156:80
221.154.59.110:80
178.134.1.238:80
85.109.190.235:443
139.59.12.63:8080
46.105.128.215:8080
216.75.37.196:8080
110.2.118.164:80
96.234.38.186:8080
78.187.204.70:80
83.156.88.159:80
138.197.140.163:8080
193.33.38.208:443
185.244.167.25:443
211.48.165.9:443
86.70.224.211:80
190.47.236.83:80
217.12.70.226:80
211.42.204.154:80
177.144.130.105:443
211.218.105.101:80
190.171.135.235:80
69.14.208.221:80
115.179.91.58:80
190.17.94.108:443
217.181.139.237:443
181.46.176.38:80
87.9.181.247:80
201.183.251.100:80
88.247.26.78:80
85.235.219.74:80
190.101.87.170:80
78.46.87.133:8080
175.103.239.50:80
46.105.131.68:8080
86.98.157.3:80
67.254.196.78:443
94.203.236.122:80
69.30.205.162:7080
82.146.55.23:7080
162.144.46.90:8080
190.161.67.63:80
176.58.93.123:80
98.15.140.226:80
185.192.75.240:443
210.111.160.220:80
220.78.29.88:80
203.153.216.178:7080
201.196.15.79:990
175.127.140.68:80
72.27.212.209:8080
24.28.178.71:80
51.77.113.97:8080
156.155.163.232:80
110.142.161.90:80
203.160.173.202:80
41.111.190.94:80
24.27.122.202:80
37.46.129.215:8080
128.92.54.20:80
212.112.113.235:80
142.93.87.198:8080
190.38.252.45:443
124.150.175.129:8080
81.82.247.216:80
210.171.146.118:80
42.51.192.231:8080
212.129.14.27:8080
181.167.35.84:80
172.104.70.207:8080
91.117.131.122:80
195.250.143.182:80
192.161.190.171:8080
72.51.153.27:80
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat hantleel.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffe0aaa5a58e9e2732dfcf21954cc34a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffe0aaa5a58e9e2732dfcf21954cc34a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hantleel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hantleel.exe -
Modifies data under HKEY_USERS 25 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings hantleel.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad hantleel.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2121EB99-AE63-435B-B281-24205EBCCF00}\WpadDecisionReason = "1" hantleel.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2121EB99-AE63-435B-B281-24205EBCCF00}\WpadDecision = "0" hantleel.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\26-12-8c-5a-aa-fa\WpadDecisionReason = "1" hantleel.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\26-12-8c-5a-aa-fa\WpadDetectedUrl hantleel.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections hantleel.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix hantleel.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" hantleel.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00d1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 hantleel.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\26-12-8c-5a-aa-fa hantleel.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\26-12-8c-5a-aa-fa\WpadDecision = "0" hantleel.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00d1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 hantleel.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 hantleel.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" hantleel.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2121EB99-AE63-435B-B281-24205EBCCF00} hantleel.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2121EB99-AE63-435B-B281-24205EBCCF00}\WpadNetworkName = "Network 3" hantleel.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings hantleel.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" hantleel.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 hantleel.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2121EB99-AE63-435B-B281-24205EBCCF00}\WpadDecisionTime = 30f37cb8e912db01 hantleel.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2121EB99-AE63-435B-B281-24205EBCCF00}\26-12-8c-5a-aa-fa hantleel.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\26-12-8c-5a-aa-fa\WpadDecisionTime = 30f37cb8e912db01 hantleel.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2121EB99-AE63-435B-B281-24205EBCCF00}\WpadDecisionTime = f0d047f5e912db01 hantleel.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\26-12-8c-5a-aa-fa\WpadDecisionTime = f0d047f5e912db01 hantleel.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1256 hantleel.exe 1256 hantleel.exe 1256 hantleel.exe 1256 hantleel.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2108 ffe0aaa5a58e9e2732dfcf21954cc34a_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2396 ffe0aaa5a58e9e2732dfcf21954cc34a_JaffaCakes118.exe 2108 ffe0aaa5a58e9e2732dfcf21954cc34a_JaffaCakes118.exe 2532 hantleel.exe 1256 hantleel.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2396 wrote to memory of 2108 2396 ffe0aaa5a58e9e2732dfcf21954cc34a_JaffaCakes118.exe 30 PID 2396 wrote to memory of 2108 2396 ffe0aaa5a58e9e2732dfcf21954cc34a_JaffaCakes118.exe 30 PID 2396 wrote to memory of 2108 2396 ffe0aaa5a58e9e2732dfcf21954cc34a_JaffaCakes118.exe 30 PID 2396 wrote to memory of 2108 2396 ffe0aaa5a58e9e2732dfcf21954cc34a_JaffaCakes118.exe 30 PID 2532 wrote to memory of 1256 2532 hantleel.exe 32 PID 2532 wrote to memory of 1256 2532 hantleel.exe 32 PID 2532 wrote to memory of 1256 2532 hantleel.exe 32 PID 2532 wrote to memory of 1256 2532 hantleel.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffe0aaa5a58e9e2732dfcf21954cc34a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ffe0aaa5a58e9e2732dfcf21954cc34a_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\ffe0aaa5a58e9e2732dfcf21954cc34a_JaffaCakes118.exe--2c9298c82⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:2108
-
-
C:\Windows\SysWOW64\hantleel.exe"C:\Windows\SysWOW64\hantleel.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\hantleel.exe--259f64d12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1256
-