Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    28/04/2024, 10:49

General

  • Target

    050541f9c0039d96e5b7a78ab9f0b73c_JaffaCakes118.exe

  • Size

    172KB

  • MD5

    050541f9c0039d96e5b7a78ab9f0b73c

  • SHA1

    d384ee571fb26c3dbfb53fdf0c68b85cd80f1ce5

  • SHA256

    3bed72af02dfe63f1e23bf58e34071962f30df999534b93ac04afc0982ecab2f

  • SHA512

    d6b01ebd6bb1ccde2b6b3ccf7b21c0c744ffca27518ea622dc0ed4407be9f92d4aa17ccd4e0abded9fd1eaccf3ddfb3e8ca0fb4ec25a8b26a97ab9f84a0d99b0

  • SSDEEP

    1536:SvrrLwNwOakX8CsVTC/8z/20X6AV8EiOpOACFsyfP292RiWV0IFT5mDzsoErpYj/:irLspsL9C/sjzTT/shO9wT3F96OvOQ6

Malware Config

Extracted

Family

emotet

Botnet

Epoch1

C2

82.230.1.24:80

51.38.124.206:80

82.196.15.205:8080

38.88.126.202:8080

61.197.92.216:80

217.199.160.224:7080

61.92.159.208:8080

186.103.141.250:443

104.131.41.185:8080

170.81.48.2:80

50.121.220.50:80

190.195.129.227:8090

187.162.248.237:80

172.104.169.32:8080

199.203.62.165:80

45.161.242.102:80

45.46.37.97:80

96.227.52.8:443

65.36.62.20:80

220.109.145.69:80

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Emotet payload 3 IoCs

    Detects Emotet payload in memory.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\050541f9c0039d96e5b7a78ab9f0b73c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\050541f9c0039d96e5b7a78ab9f0b73c_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1148

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1148-4-0x00000000003B0000-0x00000000003C0000-memory.dmp

          Filesize

          64KB

        • memory/1148-0-0x0000000000510000-0x0000000000522000-memory.dmp

          Filesize

          72KB

        • memory/1148-7-0x00000000003A0000-0x00000000003AF000-memory.dmp

          Filesize

          60KB