Analysis

  • max time kernel
    136s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-05-2024 20:53

General

  • Target

    47ff1f7f7b34fd9f81dca64c5995e91c_JaffaCakes118.exe

  • Size

    427KB

  • MD5

    47ff1f7f7b34fd9f81dca64c5995e91c

  • SHA1

    969e0248ebb2f09a3b191a46a8c8f8ed9980e419

  • SHA256

    6745580c0eb9e382bc106c965424c39e1f48ec2615ea514d6c7a6c3d06efeebe

  • SHA512

    a32cd335cd337a0fd022d6b00b8cb8a86da4cb482ddc03febb7ceae1c95b5aa02d78024d9dc0f8e79cfff1e0589da367ba1cae3f6782ae3b770237dae8140ddc

  • SSDEEP

    6144:Ff7rB2KejTMP6c1XihQvq6H/i9GSf3BpityTA:Ff3BAjTMP6c1y+v7Ha9GS/aqA

Malware Config

Extracted

Family

emotet

Botnet

Epoch3

C2

190.192.39.136:80

5.189.168.53:8080

162.241.41.111:7080

190.85.46.52:7080

190.190.15.20:80

181.95.133.104:80

41.212.89.128:80

115.176.16.221:80

143.95.101.72:8080

75.127.14.170:8080

116.202.10.123:8080

74.208.173.91:8080

103.93.220.182:80

50.116.78.109:8080

67.121.104.51:20

180.26.62.115:443

139.59.12.63:8080

76.18.16.210:80

113.161.148.81:80

5.79.70.250:8080

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Emotet payload 3 IoCs

    Detects Emotet payload in memory.

  • Suspicious behavior: EnumeratesProcesses 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\47ff1f7f7b34fd9f81dca64c5995e91c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\47ff1f7f7b34fd9f81dca64c5995e91c_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:5360

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5360-0-0x0000000002100000-0x0000000002112000-memory.dmp

    Filesize

    72KB

  • memory/5360-4-0x00000000020E0000-0x00000000020F0000-memory.dmp

    Filesize

    64KB

  • memory/5360-7-0x00000000004E0000-0x00000000004EF000-memory.dmp

    Filesize

    60KB