Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-05-2024 20:34

General

  • Target

    56a74a8908b0828cfbe2fc3fe31370b5_JaffaCakes118.exe

  • Size

    150KB

  • MD5

    56a74a8908b0828cfbe2fc3fe31370b5

  • SHA1

    c3406c91d8ac0c51b8c355eaffe78b5c631e2f23

  • SHA256

    df159e1c84b06cf4634f46a45f88bcce5b42eda62066d5281f0102d75e69c83f

  • SHA512

    8b22efe067e1479e53573e2ed62cf047877e78e11b7a3dcfb5fd7713da45672c6694971adc9859d008abc9d55d15ac721b2d95df6524a0234e99783d38005ebc

  • SSDEEP

    3072:UxncMgH2URcG0yBaoqBuBhh6U74AZeH4vwt1UgCojoo:Ulc7H2U2iaoqBihh175FSUgCojoo

Malware Config

Extracted

Family

emotet

Botnet

Epoch1

C2

189.173.113.67:443

200.123.101.90:80

170.130.31.177:8080

51.255.165.160:8080

45.56.79.249:443

185.86.148.222:8080

190.4.50.26:80

187.188.166.192:80

94.177.183.28:8080

201.213.32.59:80

76.69.29.42:80

190.96.118.15:443

81.213.215.216:50000

80.85.87.122:8080

186.1.41.111:443

183.82.97.25:80

220.241.38.226:50000

14.160.93.230:80

200.58.83.179:80

138.68.106.4:7080

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\56a74a8908b0828cfbe2fc3fe31370b5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\56a74a8908b0828cfbe2fc3fe31370b5_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5116
    • C:\Users\Admin\AppData\Local\Temp\56a74a8908b0828cfbe2fc3fe31370b5_JaffaCakes118.exe
      --7cbcba61
      2⤵
      • Suspicious behavior: RenamesItself
      PID:4916
  • C:\Windows\SysWOW64\navtimeout.exe
    "C:\Windows\SysWOW64\navtimeout.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3980
    • C:\Windows\SysWOW64\navtimeout.exe
      --b8e83ad0
      2⤵
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      PID:4632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Microsoft\Crypto\RSA\S-1-5-18\5ee9f8cddb3ff188c6a99dcf99203008_41e50f4a-4a76-42e1-a3df-51306e426307

    Filesize

    50B

    MD5

    aaec799e344163d0d188e0590697cb1e

    SHA1

    94aa3e9674f1335e1cdf6dc7b7c7cdbf5c97c65d

    SHA256

    d627b40c75603106e24782fdb852c180722ae6d472bdb60367bf2708f28f5454

    SHA512

    285e78b5ddc3049b2b167e0c785f410260eecdbb745489e3e5984e118c627e97b7499f8a937a4a6d5da4fe046fb220fc70fd5abc583083909fd005b1ee4f03b0

  • memory/3980-13-0x0000000001160000-0x0000000001177000-memory.dmp

    Filesize

    92KB

  • memory/3980-18-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4632-26-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4916-7-0x00000000006C0000-0x00000000006D7000-memory.dmp

    Filesize

    92KB

  • memory/4916-19-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/5116-5-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/5116-6-0x00000000001B0000-0x00000000001C1000-memory.dmp

    Filesize

    68KB

  • memory/5116-0-0x00000000001D0000-0x00000000001E7000-memory.dmp

    Filesize

    92KB