Analysis
-
max time kernel
137s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 17:52
Static task
static1
Behavioral task
behavioral1
Sample
4ac3664fd33f5c531b44506989dcdc84_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
4ac3664fd33f5c531b44506989dcdc84_JaffaCakes118.dll
-
Size
330KB
-
MD5
4ac3664fd33f5c531b44506989dcdc84
-
SHA1
46b30b64e1892c42c8eb02a2ce5822e242716190
-
SHA256
bd4ab6eea89638a0942b861a50481109a98c637fb25d0cdee529ce5886405f7a
-
SHA512
d75f8d95c70871597f7c37572258a2737c19d3a45d3fc35c420fd172dd813407669ab2b0c68597bf49db989fad88b629020336666d3394640b24b76781824d35
-
SSDEEP
3072:LRq1sFAd2gQ5PmBvNZwnnq1gn2RvoXiDzAYgrO1v2F5j8eFu:tq1sFAwgwmBv3wnIgG4oAYxvU54eu
Malware Config
Extracted
emotet
Epoch3
190.55.186.229:80
203.157.152.9:7080
157.245.145.87:443
109.99.146.210:8080
116.202.10.123:8080
172.96.190.154:8080
163.53.204.180:443
190.107.118.125:80
91.93.3.85:8080
185.142.236.163:443
115.79.195.246:80
120.51.34.254:80
192.210.217.94:8080
198.20.228.9:8080
91.75.75.46:80
54.38.143.245:8080
161.49.84.2:80
162.144.145.58:8080
178.33.167.120:8080
201.193.160.196:80
143.95.101.72:8080
37.205.9.252:7080
178.62.254.156:8080
103.80.51.61:8080
74.208.173.91:8080
203.153.216.178:7080
152.32.75.74:443
37.46.129.215:8080
70.32.89.105:8080
179.233.3.89:80
132.248.38.158:80
103.229.73.17:8080
2.58.16.86:8080
82.78.179.117:443
139.59.61.215:443
75.127.14.170:8080
78.90.78.210:80
122.116.104.238:8443
5.79.70.250:8080
182.73.7.59:8080
192.163.221.191:8080
139.59.12.63:8080
190.19.169.69:443
58.27.215.3:8080
201.163.74.204:80
175.103.38.146:80
139.5.101.203:80
201.212.61.66:80
117.2.139.117:443
186.96.170.61:80
50.116.78.109:8080
68.133.75.203:8080
183.91.3.63:80
65.32.168.171:80
172.104.46.84:8080
27.78.27.110:443
172.193.14.201:80
103.93.220.182:80
49.206.16.156:80
223.17.215.76:80
203.56.191.129:8080
195.159.28.244:8080
195.201.56.70:8080
110.37.224.243:80
110.172.180.180:8080
188.166.220.180:7080
180.148.4.130:8080
157.7.164.178:8081
88.58.209.2:80
91.83.93.103:443
24.230.124.78:80
8.4.9.137:8080
203.160.167.243:80
192.241.220.183:8080
79.133.6.236:8080
186.146.229.172:80
46.105.131.68:8080
178.254.36.182:8080
46.32.229.152:8080
202.29.237.113:8080
185.208.226.142:8080
2.82.75.215:80
190.85.46.52:7080
190.18.184.113:80
188.226.165.170:8080
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 2856 rundll32.exe -
Drops file in System32 directory 1 IoCs
Processes:
rundll32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Vuicoxmkvjyqrubb\ppzwvzjeirnwcbp.nld rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: RenamesItself 1 IoCs
Processes:
rundll32.exepid process 2400 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 3308 wrote to memory of 2400 3308 rundll32.exe rundll32.exe PID 3308 wrote to memory of 2400 3308 rundll32.exe rundll32.exe PID 3308 wrote to memory of 2400 3308 rundll32.exe rundll32.exe PID 2400 wrote to memory of 2856 2400 rundll32.exe rundll32.exe PID 2400 wrote to memory of 2856 2400 rundll32.exe rundll32.exe PID 2400 wrote to memory of 2856 2400 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4ac3664fd33f5c531b44506989dcdc84_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4ac3664fd33f5c531b44506989dcdc84_JaffaCakes118.dll,#12⤵
- Drops file in System32 directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Vuicoxmkvjyqrubb\ppzwvzjeirnwcbp.nld",FYgGdGhZ3⤵
- Loads dropped DLL
PID:2856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
330KB
MD54ac3664fd33f5c531b44506989dcdc84
SHA146b30b64e1892c42c8eb02a2ce5822e242716190
SHA256bd4ab6eea89638a0942b861a50481109a98c637fb25d0cdee529ce5886405f7a
SHA512d75f8d95c70871597f7c37572258a2737c19d3a45d3fc35c420fd172dd813407669ab2b0c68597bf49db989fad88b629020336666d3394640b24b76781824d35