Analysis Overview
SHA256
78a267bf4117662166b2382d9c3ed3552f2f4f322fb80f962f6d92306893badf
Threat Level: Known bad
The file 38e0d4090d5cd5f56d75815ab55ef54c_JaffaCakes118 was found to be: Known bad.
Malicious Activity Summary
Emotet
Blocklisted process makes network request
Loads dropped DLL
Drops file in System32 directory
Enumerates physical storage devices
Unsigned PE
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: RenamesItself
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-07-11 11:13
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-07-11 11:13
Reported
2024-07-11 11:15
Platform
win7-20240708-en
Max time kernel
148s
Max time network
148s
Command Line
Signatures
Emotet
Blocklisted process makes network request
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\SysWOW64\Gipchnisw\cuzjqjld.nyv | C:\Windows\SysWOW64\rundll32.exe | N/A |
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious behavior: RenamesItself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\38e0d4090d5cd5f56d75815ab55ef54c_JaffaCakes118.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\38e0d4090d5cd5f56d75815ab55ef54c_JaffaCakes118.dll,#1
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Gipchnisw\cuzjqjld.nyv",XMEDOGZzXfyGmV
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Gipchnisw\cuzjqjld.nyv",#1
Network
| Country | Destination | Domain | Proto |
| RO | 84.232.229.24:80 | tcp | |
| RO | 84.232.229.24:80 | tcp | |
| FR | 51.255.203.164:8080 | tcp | |
| FR | 51.255.203.164:8080 | tcp | |
| DE | 217.160.169.110:8080 | tcp | |
| DE | 217.160.169.110:8080 | tcp |
Files
memory/1716-0-0x0000000000300000-0x000000000039E000-memory.dmp
memory/1716-2-0x0000000000301000-0x0000000000364000-memory.dmp
memory/1716-1-0x0000000000130000-0x0000000000157000-memory.dmp
memory/1716-4-0x0000000000301000-0x0000000000364000-memory.dmp
memory/1716-3-0x0000000000300000-0x000000000039E000-memory.dmp
memory/2488-5-0x0000000000940000-0x00000000009DE000-memory.dmp
memory/2488-6-0x0000000000941000-0x00000000009A4000-memory.dmp
memory/2488-7-0x0000000000940000-0x00000000009DE000-memory.dmp
memory/3052-8-0x0000000000400000-0x0000000000424000-memory.dmp
memory/3052-9-0x0000000000400000-0x000000000049E000-memory.dmp
memory/3052-11-0x0000000000400000-0x0000000000424000-memory.dmp
memory/3052-14-0x0000000000400000-0x000000000049E000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-07-11 11:13
Reported
2024-07-11 11:15
Platform
win10v2004-20240709-en
Max time kernel
143s
Max time network
147s
Command Line
Signatures
Emotet
Blocklisted process makes network request
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\SysWOW64\Gdsazy\ktmpx.omr | C:\Windows\SysWOW64\rundll32.exe | N/A |
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious behavior: RenamesItself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2520 wrote to memory of 4224 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2520 wrote to memory of 4224 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2520 wrote to memory of 4224 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 4224 wrote to memory of 1852 | N/A | C:\Windows\SysWOW64\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 4224 wrote to memory of 1852 | N/A | C:\Windows\SysWOW64\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 4224 wrote to memory of 1852 | N/A | C:\Windows\SysWOW64\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 1852 wrote to memory of 1144 | N/A | C:\Windows\SysWOW64\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 1852 wrote to memory of 1144 | N/A | C:\Windows\SysWOW64\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 1852 wrote to memory of 1144 | N/A | C:\Windows\SysWOW64\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\38e0d4090d5cd5f56d75815ab55ef54c_JaffaCakes118.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\38e0d4090d5cd5f56d75815ab55ef54c_JaffaCakes118.dll,#1
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Gdsazy\ktmpx.omr",ZNpVTD
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Gdsazy\ktmpx.omr",#1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 73.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 81.144.22.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| RO | 84.232.229.24:80 | tcp | |
| US | 8.8.8.8:53 | 157.123.68.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| FR | 51.255.203.164:8080 | tcp | |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| DE | 217.160.169.110:8080 | tcp | |
| ES | 185.183.16.47:80 | tcp | |
| US | 8.8.8.8:53 | 98.58.20.217.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 31.243.111.52.in-addr.arpa | udp |
| CL | 190.45.24.210:80 | tcp | |
| MX | 187.162.248.237:80 | tcp |
Files
memory/4224-0-0x0000000000A00000-0x0000000000A9E000-memory.dmp
memory/4224-1-0x0000000000AB0000-0x0000000000AD7000-memory.dmp
memory/4224-2-0x0000000000A00000-0x0000000000A24000-memory.dmp
memory/4224-3-0x0000000000A00000-0x0000000000A9E000-memory.dmp
memory/4224-4-0x0000000000A00000-0x0000000000A24000-memory.dmp
C:\Windows\SysWOW64\Gdsazy\ktmpx.omr
| MD5 | 38e0d4090d5cd5f56d75815ab55ef54c |
| SHA1 | 0aa3101b4d096b4a5464fdc1c1ff87347a692335 |
| SHA256 | 78a267bf4117662166b2382d9c3ed3552f2f4f322fb80f962f6d92306893badf |
| SHA512 | c05a465ebd1ef0c15b9ba80d89f4971d85fed5979f3f6fea51c684052cf4ca848fb0df84e6625e084ff9e951d9ae8dd8cd6cd541e6d379fd121d677066c51631 |
memory/1852-6-0x0000000000400000-0x0000000000424000-memory.dmp
memory/1852-8-0x0000000000400000-0x0000000000424000-memory.dmp
memory/1852-7-0x0000000000400000-0x000000000049E000-memory.dmp
memory/1144-11-0x0000000000400000-0x000000000049E000-memory.dmp
memory/1144-10-0x0000000000400000-0x000000000049E000-memory.dmp
memory/1144-12-0x0000000000400000-0x000000000049E000-memory.dmp
memory/1144-14-0x0000000000400000-0x000000000049E000-memory.dmp