Analysis

  • max time kernel
    136s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 12:14

General

  • Target

    7571dd27cd76e6f1bba3d0764de00d45_JaffaCakes118.exe

  • Size

    980KB

  • MD5

    7571dd27cd76e6f1bba3d0764de00d45

  • SHA1

    2a5c6d166202e0076a495f5b282f20da0f840879

  • SHA256

    35638327da7ac722a177c6aabde4bc0b1010643c1b47b8cee8a3be2a211e5218

  • SHA512

    6ef7e3d8c8c551cff99f155d1882e046df19fe84e310367db29db9c0b7d92260370d366cc999597b7d800f53cacf4a255a9e8550d72e3e76ddac14e7e8306f75

  • SSDEEP

    12288:KWgHwLMoeYPdiZPIcMd+7FpSlbDocc/x4QWmS:qZPIrdwsbEXWQ

Malware Config

Extracted

Family

emotet

Botnet

Epoch1

C2

82.76.111.249:443

116.125.120.88:443

217.160.182.191:8080

189.1.185.98:8080

189.194.58.119:80

213.181.91.224:80

219.92.13.25:80

190.6.193.152:8080

61.92.159.208:8080

209.236.123.42:8080

12.162.84.2:8080

190.147.137.153:443

104.131.103.37:8080

212.231.60.98:80

202.62.39.111:80

82.240.207.95:443

170.81.48.2:80

177.74.228.34:80

82.196.15.205:8080

114.109.179.60:80

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Emotet payload 4 IoCs

    Detects Emotet payload in memory.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7571dd27cd76e6f1bba3d0764de00d45_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7571dd27cd76e6f1bba3d0764de00d45_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2748

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2748-1-0x0000000000360000-0x000000000036C000-memory.dmp
    Filesize

    48KB

  • memory/2748-5-0x0000000000570000-0x0000000000670000-memory.dmp
    Filesize

    1024KB

  • memory/2748-6-0x0000000000360000-0x000000000036C000-memory.dmp
    Filesize

    48KB

  • memory/2748-7-0x0000000000570000-0x0000000000670000-memory.dmp
    Filesize

    1024KB