Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 03:34
Static task
static1
Behavioral task
behavioral1
Sample
ffe0aaa5a58e9e2732dfcf21954cc34a_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ffe0aaa5a58e9e2732dfcf21954cc34a_JaffaCakes118.exe
-
Size
644KB
-
MD5
ffe0aaa5a58e9e2732dfcf21954cc34a
-
SHA1
8819cd5ee0547d6186837ae7b2c006e21e47e76d
-
SHA256
7e6424b06803d1827a54cebfe837aeb14cf9b52f9e04b8ae0ec3cbd0e1cc314a
-
SHA512
30a57d6277f57a639f3742bc7665b48cf21cd73804180422df725106cbc008fb24e895c358faff96d3e17ede9a34b99726e0b8e7d96c120e35ad7595a03d0292
-
SSDEEP
6144:SWL5bs/xDPi1acqBcDd0SnawIDinG/sHuyts3s4AlLkInTH2I3ChtRflGLEh2Heg:9tbsIacruwRTHuSDtkGTvUjEEEVreD
Malware Config
Extracted
emotet
Epoch3
190.93.210.113:80
165.100.148.200:8080
197.94.32.129:8080
45.79.75.232:8080
124.150.175.133:80
164.68.115.146:8080
5.189.148.98:8080
58.93.151.148:80
186.84.173.136:8080
37.70.131.107:80
66.229.161.86:443
188.230.134.205:80
95.216.212.157:8080
189.61.200.9:443
50.116.78.109:8080
23.253.207.142:8080
86.6.123.109:80
190.5.162.204:80
187.250.92.82:80
113.52.135.33:7080
95.216.207.86:7080
182.176.116.139:995
82.79.244.92:80
189.225.211.171:443
46.17.6.116:8080
82.165.15.188:8080
192.210.217.94:8080
174.57.150.13:8080
200.71.112.158:53
58.185.224.18:80
120.51.83.89:443
100.38.11.243:80
108.184.9.44:80
59.158.164.66:443
95.255.140.89:443
51.38.134.203:8080
163.172.97.112:8080
37.59.24.25:8080
154.120.227.190:443
89.215.225.15:80
78.186.102.195:80
41.77.74.214:443
95.9.217.200:8080
191.100.24.201:50000
200.41.121.69:443
192.241.220.183:8080
158.69.167.246:8080
112.186.195.176:80
177.103.240.93:80
119.57.36.54:8080
41.190.148.90:80
210.224.65.117:80
91.117.31.181:80
92.16.222.156:80
221.154.59.110:80
178.134.1.238:80
85.109.190.235:443
139.59.12.63:8080
46.105.128.215:8080
216.75.37.196:8080
110.2.118.164:80
96.234.38.186:8080
78.187.204.70:80
83.156.88.159:80
138.197.140.163:8080
193.33.38.208:443
185.244.167.25:443
211.48.165.9:443
86.70.224.211:80
190.47.236.83:80
217.12.70.226:80
211.42.204.154:80
177.144.130.105:443
211.218.105.101:80
190.171.135.235:80
69.14.208.221:80
115.179.91.58:80
190.17.94.108:443
217.181.139.237:443
181.46.176.38:80
87.9.181.247:80
201.183.251.100:80
88.247.26.78:80
85.235.219.74:80
190.101.87.170:80
78.46.87.133:8080
175.103.239.50:80
46.105.131.68:8080
86.98.157.3:80
67.254.196.78:443
94.203.236.122:80
69.30.205.162:7080
82.146.55.23:7080
162.144.46.90:8080
190.161.67.63:80
176.58.93.123:80
98.15.140.226:80
185.192.75.240:443
210.111.160.220:80
220.78.29.88:80
203.153.216.178:7080
201.196.15.79:990
175.127.140.68:80
72.27.212.209:8080
24.28.178.71:80
51.77.113.97:8080
156.155.163.232:80
110.142.161.90:80
203.160.173.202:80
41.111.190.94:80
24.27.122.202:80
37.46.129.215:8080
128.92.54.20:80
212.112.113.235:80
142.93.87.198:8080
190.38.252.45:443
124.150.175.129:8080
81.82.247.216:80
210.171.146.118:80
42.51.192.231:8080
212.129.14.27:8080
181.167.35.84:80
172.104.70.207:8080
91.117.131.122:80
195.250.143.182:80
192.161.190.171:8080
72.51.153.27:80
Signatures
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 inboxipmi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE inboxipmi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies inboxipmi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 inboxipmi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffe0aaa5a58e9e2732dfcf21954cc34a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffe0aaa5a58e9e2732dfcf21954cc34a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inboxipmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inboxipmi.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix inboxipmi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" inboxipmi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" inboxipmi.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4756 inboxipmi.exe 4756 inboxipmi.exe 4756 inboxipmi.exe 4756 inboxipmi.exe 4756 inboxipmi.exe 4756 inboxipmi.exe 4756 inboxipmi.exe 4756 inboxipmi.exe 4756 inboxipmi.exe 4756 inboxipmi.exe 4756 inboxipmi.exe 4756 inboxipmi.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 212 ffe0aaa5a58e9e2732dfcf21954cc34a_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 752 ffe0aaa5a58e9e2732dfcf21954cc34a_JaffaCakes118.exe 212 ffe0aaa5a58e9e2732dfcf21954cc34a_JaffaCakes118.exe 1536 inboxipmi.exe 4756 inboxipmi.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 752 wrote to memory of 212 752 ffe0aaa5a58e9e2732dfcf21954cc34a_JaffaCakes118.exe 82 PID 752 wrote to memory of 212 752 ffe0aaa5a58e9e2732dfcf21954cc34a_JaffaCakes118.exe 82 PID 752 wrote to memory of 212 752 ffe0aaa5a58e9e2732dfcf21954cc34a_JaffaCakes118.exe 82 PID 1536 wrote to memory of 4756 1536 inboxipmi.exe 84 PID 1536 wrote to memory of 4756 1536 inboxipmi.exe 84 PID 1536 wrote to memory of 4756 1536 inboxipmi.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffe0aaa5a58e9e2732dfcf21954cc34a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ffe0aaa5a58e9e2732dfcf21954cc34a_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\AppData\Local\Temp\ffe0aaa5a58e9e2732dfcf21954cc34a_JaffaCakes118.exe--2c9298c82⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:212
-
-
C:\Windows\SysWOW64\inboxipmi.exe"C:\Windows\SysWOW64\inboxipmi.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\inboxipmi.exe--32d92d5f2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Crypto\RSA\S-1-5-18\e33aec243fbda420976c3735c1f68a0d_c186ecc3-67e4-4d2b-8682-b6c322da87aa
Filesize50B
MD5d3b2072f22c54a987baf5b09bc63a002
SHA1e405a097074ca95e27198f3f5279be9aa01536ff
SHA256c6af0c5856ec37ae236b3086cae6caeba8b637db0144d3581d53cf65cf5013e8
SHA512d76f5e53fc0568ec48fb67ae02974fb9832e821a34683f56348c15aeaaf3a03312e3fa2e27579ac94145967ae221c2dc8e322ce0fe3c4d9242505b44c05ddbdf