Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
14-06-2024 09:13
Static task
static1
Behavioral task
behavioral1
Sample
a8e7ccce2bca95419077d139bc39c9c4_JaffaCakes118.exe
Resource
win7-20231129-en
General
-
Target
a8e7ccce2bca95419077d139bc39c9c4_JaffaCakes118.exe
-
Size
667KB
-
MD5
a8e7ccce2bca95419077d139bc39c9c4
-
SHA1
ff7014c7e93db2879800ed3fcaad11ff09f5d4ea
-
SHA256
a0bba5b583f8902e8751da317b0749d20e5d6d0b996c21e79be2703b9972b0c3
-
SHA512
be5a2a3814cc3756218cf34fecdfa4709e1808a7c8bf9eed11192ff7d7feb44b83d7ba15f0833db8bc16a4a8156f89e3a109972edf97d22ccafedb6cbed70a79
-
SSDEEP
12288:6+JJG//twCZ1CFy6jpcFnRO6QuiCDuBMoCgazA:6+J6/twC1N6jiVk6Quix4c
Malware Config
Extracted
emotet
Epoch2
104.193.103.61:80
104.131.123.136:443
5.196.108.189:8080
121.124.124.40:7080
87.106.139.101:8080
213.196.135.145:80
50.35.17.13:80
38.18.235.242:80
24.43.32.186:80
82.80.155.43:80
103.86.49.11:8080
113.61.66.94:80
24.137.76.62:80
187.49.206.134:80
42.200.107.142:80
24.179.13.119:80
93.147.212.206:80
108.46.29.236:80
105.186.233.33:80
37.139.21.175:8080
61.19.246.238:443
97.82.79.83:80
78.188.106.53:443
168.235.67.138:7080
83.169.36.251:8080
89.216.122.92:80
176.111.60.55:8080
181.169.34.190:80
118.83.154.64:443
140.186.212.146:80
139.59.60.244:8080
174.106.122.139:80
194.187.133.160:443
62.30.7.67:443
68.252.26.78:80
75.139.38.211:80
130.0.132.242:80
172.104.97.173:8080
85.152.162.105:80
74.208.45.104:8080
71.15.245.148:8080
139.162.60.124:8080
62.75.141.82:80
203.153.216.189:7080
91.211.88.52:7080
96.249.236.156:443
95.213.236.64:8080
66.65.136.14:80
104.131.44.150:8080
91.146.156.228:80
79.98.24.39:8080
174.45.13.118:80
157.245.99.39:8080
80.241.255.202:8080
71.72.196.159:80
120.150.60.189:80
220.245.198.194:80
121.7.31.214:80
85.96.199.93:80
67.10.155.92:80
109.74.5.95:8080
188.219.31.12:80
162.241.242.173:8080
110.145.77.103:80
78.24.219.147:8080
47.144.21.12:443
139.99.158.11:443
110.142.236.207:80
94.23.237.171:443
50.91.114.38:80
76.175.162.101:80
46.105.131.79:8080
181.169.235.7:80
87.106.136.232:8080
5.39.91.110:7080
24.43.99.75:80
104.131.11.150:443
139.162.108.71:8080
209.141.54.221:8080
124.41.215.226:80
123.176.25.234:80
137.59.187.107:8080
216.139.123.119:80
94.200.114.161:80
79.137.83.50:443
5.196.74.210:8080
104.236.246.93:8080
137.119.36.33:80
37.187.72.193:8080
172.91.208.86:80
142.112.10.95:20
134.209.36.254:8080
190.240.194.77:443
1.221.254.82:80
185.94.252.104:443
Signatures
-
Processes:
resource yara_rule behavioral2/memory/1968-5-0x0000000000660000-0x0000000000670000-memory.dmp emotet behavioral2/memory/1968-0-0x0000000000640000-0x0000000000652000-memory.dmp emotet behavioral2/memory/1968-7-0x0000000000610000-0x000000000061F000-memory.dmp emotet behavioral2/memory/4376-10-0x0000000002130000-0x0000000002142000-memory.dmp emotet behavioral2/memory/4376-14-0x00000000004F0000-0x0000000000500000-memory.dmp emotet -
Executes dropped EXE 1 IoCs
Processes:
spfileq.exepid process 4376 spfileq.exe -
Drops file in System32 directory 1 IoCs
Processes:
a8e7ccce2bca95419077d139bc39c9c4_JaffaCakes118.exedescription ioc process File opened for modification C:\Windows\SysWOW64\shell32\spfileq.exe a8e7ccce2bca95419077d139bc39c9c4_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
spfileq.exepid process 4376 spfileq.exe 4376 spfileq.exe 4376 spfileq.exe 4376 spfileq.exe 4376 spfileq.exe 4376 spfileq.exe 4376 spfileq.exe 4376 spfileq.exe 4376 spfileq.exe 4376 spfileq.exe 4376 spfileq.exe 4376 spfileq.exe 4376 spfileq.exe 4376 spfileq.exe 4376 spfileq.exe 4376 spfileq.exe 4376 spfileq.exe 4376 spfileq.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
a8e7ccce2bca95419077d139bc39c9c4_JaffaCakes118.exepid process 1968 a8e7ccce2bca95419077d139bc39c9c4_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
a8e7ccce2bca95419077d139bc39c9c4_JaffaCakes118.exedescription pid process target process PID 1968 wrote to memory of 4376 1968 a8e7ccce2bca95419077d139bc39c9c4_JaffaCakes118.exe spfileq.exe PID 1968 wrote to memory of 4376 1968 a8e7ccce2bca95419077d139bc39c9c4_JaffaCakes118.exe spfileq.exe PID 1968 wrote to memory of 4376 1968 a8e7ccce2bca95419077d139bc39c9c4_JaffaCakes118.exe spfileq.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8e7ccce2bca95419077d139bc39c9c4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a8e7ccce2bca95419077d139bc39c9c4_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\shell32\spfileq.exe"C:\Windows\SysWOW64\shell32\spfileq.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4448,i,8998666007764333392,14724298544432336038,262144 --variations-seed-version --mojo-platform-channel-handle=4464 /prefetch:81⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\shell32\spfileq.exeFilesize
667KB
MD5a8e7ccce2bca95419077d139bc39c9c4
SHA1ff7014c7e93db2879800ed3fcaad11ff09f5d4ea
SHA256a0bba5b583f8902e8751da317b0749d20e5d6d0b996c21e79be2703b9972b0c3
SHA512be5a2a3814cc3756218cf34fecdfa4709e1808a7c8bf9eed11192ff7d7feb44b83d7ba15f0833db8bc16a4a8156f89e3a109972edf97d22ccafedb6cbed70a79
-
memory/1968-5-0x0000000000660000-0x0000000000670000-memory.dmpFilesize
64KB
-
memory/1968-0-0x0000000000640000-0x0000000000652000-memory.dmpFilesize
72KB
-
memory/1968-7-0x0000000000610000-0x000000000061F000-memory.dmpFilesize
60KB
-
memory/1968-8-0x0000000000400000-0x00000000004AC000-memory.dmpFilesize
688KB
-
memory/4376-10-0x0000000002130000-0x0000000002142000-memory.dmpFilesize
72KB
-
memory/4376-14-0x00000000004F0000-0x0000000000500000-memory.dmpFilesize
64KB