Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2024 09:37
Static task
static1
Behavioral task
behavioral1
Sample
5323b594d60815546b33c63285460b6a_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
5323b594d60815546b33c63285460b6a_JaffaCakes118.dll
-
Size
278KB
-
MD5
5323b594d60815546b33c63285460b6a
-
SHA1
5950b1d20f10453051956c28bdbfb130f60120e2
-
SHA256
aa4563a7bc419e1154107338118c0667cc43dccdf453144ddcc32ea76d99f9fe
-
SHA512
e4e73ea5d20501d8d782b950cfc045e0b6c6eab15b7fb315e005013d4297468226205adc85c6a121ed6ff456dc912190b8e1e949b5781d71540b4a5e2b5d3986
-
SSDEEP
6144:0hlBeZgR9LqvgFcwNAwhGV52n5Dv4JdEqvQykqRqYdBx8pRA7OZJI:0h3eZgRQCcw+MN54dEq7kqRtoLZ6
Malware Config
Extracted
emotet
Epoch3
161.49.84.2:80
68.133.75.203:8080
203.157.152.9:7080
157.245.145.87:443
195.159.28.244:8080
175.103.38.146:80
75.127.14.170:8080
49.206.16.156:80
185.208.226.142:8080
91.93.3.85:8080
58.27.215.3:8080
172.96.190.154:8080
143.95.101.72:8080
162.144.145.58:8080
172.193.14.201:80
192.163.221.191:8080
183.91.3.63:80
2.82.75.215:80
110.37.224.243:80
54.38.143.245:8080
37.205.9.252:7080
152.32.75.74:443
202.29.237.113:8080
91.83.93.103:443
37.46.129.215:8080
27.78.27.110:443
85.247.144.202:80
110.1.113.179:443
88.58.209.2:80
120.51.34.254:80
117.2.139.117:443
188.166.220.180:7080
79.133.6.236:8080
115.79.195.246:80
8.4.9.137:8080
190.18.184.113:80
5.79.70.250:8080
201.193.160.196:80
116.202.10.123:8080
163.53.204.180:443
201.212.61.66:80
78.90.78.210:80
110.172.180.180:8080
122.116.104.238:8443
192.241.220.183:8080
172.104.46.84:8080
203.160.167.243:80
178.254.36.182:8080
24.230.124.78:80
50.116.78.109:8080
103.80.51.61:8080
103.229.73.17:8080
70.32.89.105:8080
46.32.229.152:8080
186.96.170.61:80
185.142.236.163:443
190.85.46.52:7080
74.208.173.91:8080
223.17.215.76:80
182.73.7.59:8080
186.146.229.172:80
198.20.228.9:8080
192.210.217.94:8080
188.226.165.170:8080
46.105.131.68:8080
91.75.75.46:80
103.93.220.182:80
2.58.16.86:8080
195.201.56.70:8080
139.5.101.203:80
157.7.164.178:8081
180.148.4.130:8080
109.99.146.210:8080
113.161.176.235:80
139.59.12.63:8080
113.203.238.130:80
180.52.66.193:80
139.59.61.215:443
178.33.167.120:8080
178.62.254.156:8080
125.0.215.60:80
203.56.191.129:8080
82.78.179.117:443
203.153.216.178:7080
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 19 2100 rundll32.exe 35 2100 rundll32.exe 39 2100 rundll32.exe 45 2100 rundll32.exe 46 2100 rundll32.exe 52 2100 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2100 rundll32.exe 2100 rundll32.exe 2100 rundll32.exe 2100 rundll32.exe 2100 rundll32.exe 2100 rundll32.exe 2100 rundll32.exe 2100 rundll32.exe 2100 rundll32.exe 2100 rundll32.exe 2100 rundll32.exe 2100 rundll32.exe 2100 rundll32.exe 2100 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3524 wrote to memory of 2100 3524 rundll32.exe 84 PID 3524 wrote to memory of 2100 3524 rundll32.exe 84 PID 3524 wrote to memory of 2100 3524 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5323b594d60815546b33c63285460b6a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5323b594d60815546b33c63285460b6a_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:2100
-