Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 18:25

General

  • Target

    683104a487b5c9fa589c6bdea44680d8_JaffaCakes118.exe

  • Size

    224KB

  • MD5

    683104a487b5c9fa589c6bdea44680d8

  • SHA1

    262669d99144ca0bd52dff169b629ac1d29ac947

  • SHA256

    9096b378d52f7831e6f3653c7b3a5ff5495e12b8fce7c332db55fc1b6b93c7eb

  • SHA512

    36ec4931b7cba1d1042b92facb90100eeea6d3a868128f8cad2f6e0d9cb75d662834ae9d0a3b2cdc8186a28e5fb2903c12c6cb24fdcd3f62dca09afcaf5e4435

  • SSDEEP

    3072:VCVMbVA7Nd3KaEeh35MGCpBLP4YjVMQ+MOUO7Tqvnmyo+Nfd68K9T:OWm6fepFCp1PlVX2qvmyoofdZK5

Malware Config

Extracted

Family

emotet

Botnet

Epoch3

C2

115.176.16.221:80

45.79.16.230:7080

145.239.169.32:7080

190.85.46.52:7080

180.26.62.115:443

179.5.118.12:80

189.160.188.97:80

5.79.70.250:8080

126.126.139.26:443

41.84.243.145:80

79.133.6.236:8080

139.59.12.63:8080

95.216.205.155:8080

45.177.120.37:8080

54.38.143.245:8080

157.7.164.178:8081

41.212.89.128:80

50.116.78.109:8080

75.127.14.170:8080

49.243.9.118:80

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Emotet payload 3 IoCs

    Detects Emotet payload in memory.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\683104a487b5c9fa589c6bdea44680d8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\683104a487b5c9fa589c6bdea44680d8_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1848

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1848-0-0x00000000003E0000-0x00000000003F2000-memory.dmp
    Filesize

    72KB

  • memory/1848-4-0x0000000000440000-0x0000000000450000-memory.dmp
    Filesize

    64KB

  • memory/1848-7-0x00000000002C0000-0x00000000002CF000-memory.dmp
    Filesize

    60KB