Analysis

  • max time kernel
    139s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    14/06/2024, 10:58

General

  • Target

    a950b4eb7edb4c400a964674c5f3e6a0_JaffaCakes118.exe

  • Size

    132KB

  • MD5

    a950b4eb7edb4c400a964674c5f3e6a0

  • SHA1

    dc6d071f3aa667d1a3fcd5a72c6566468ae6a912

  • SHA256

    9eb06c443ba9b84d4ad5c967752c5c13bfc7cac336789560aadb2b655c0a9569

  • SHA512

    7d8835f1da424aa72540ba02df4ed9a0928aef04e883d384df1c1c4f14817b0497fc171b17554b4299a219002c82f457a50c7fd2cbbaa99336618c8693acfe80

  • SSDEEP

    1536:rmYczEyk9QpGW+Za5EpijSQr5RCs6Hl68+895baYCSjTZyl2JtXaBIYH7prGOzJt:r4z+Qk/Mj5u1P95ba2E0qBDbpasaxb0

Malware Config

Extracted

Family

emotet

Botnet

Epoch3

C2

178.153.91.22:80

92.17.138.248:80

114.183.140.94:80

172.105.213.30:80

69.30.205.162:7080

50.63.13.135:8080

192.161.190.171:8080

210.111.160.220:80

181.44.166.242:80

41.218.118.66:80

46.17.6.116:8080

142.93.87.198:8080

113.52.135.33:7080

187.177.155.123:990

172.90.70.168:443

198.57.217.170:8080

123.142.37.165:80

95.216.212.157:8080

187.250.92.82:80

216.75.37.196:8080

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 21 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a950b4eb7edb4c400a964674c5f3e6a0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a950b4eb7edb4c400a964674c5f3e6a0_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1612
    • C:\Users\Admin\AppData\Local\Temp\a950b4eb7edb4c400a964674c5f3e6a0_JaffaCakes118.exe
      --b2418ab1
      2⤵
      • Suspicious behavior: RenamesItself
      • Suspicious use of SetWindowsHookEx
      PID:2620
  • C:\Windows\SysWOW64\specialangle.exe
    "C:\Windows\SysWOW64\specialangle.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2648
    • C:\Windows\SysWOW64\specialangle.exe
      --209791ac
      2⤵
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1612-0-0x0000000000310000-0x0000000000327000-memory.dmp

    Filesize

    92KB

  • memory/1612-5-0x00000000002F0000-0x0000000000301000-memory.dmp

    Filesize

    68KB

  • memory/2588-17-0x00000000005E0000-0x00000000005F7000-memory.dmp

    Filesize

    92KB

  • memory/2620-6-0x0000000000280000-0x0000000000297000-memory.dmp

    Filesize

    92KB

  • memory/2620-16-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2648-12-0x0000000001030000-0x0000000001047000-memory.dmp

    Filesize

    92KB