Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    08-09-2024 16:29

General

  • Target

    d4c8ed6fcf357df57de0aee8b97fa4ba_JaffaCakes118.exe

  • Size

    540KB

  • MD5

    d4c8ed6fcf357df57de0aee8b97fa4ba

  • SHA1

    7ea7666284e6fcdc7640db3582f110870320f648

  • SHA256

    bcff938a98d348fd7270cc7c9bb7a2eab74f67602599b84a3a94abfaf6866486

  • SHA512

    769d0e5a7ca291a65e66fd296196e93b406d8cf3bca07f33e402eaadabfb83c008449402f539c3758e19c1ba9fe5c8d045de818e55d5af018f7b687992643eb0

  • SSDEEP

    6144:Kh3jO6DyHUWraQKNbG0HWjtHsEROB3kYVjTRGjx5N0pj1rZ:5Gy0WraQK9vHWBHsEROB5R66

Malware Config

Extracted

Family

emotet

Botnet

Epoch3

C2

190.16.101.10:80

190.217.1.149:80

45.56.122.75:80

85.25.92.96:8080

94.177.253.126:80

187.188.166.192:80

192.241.220.183:8080

189.132.130.111:8080

186.109.91.136:80

186.92.11.143:8080

203.99.182.135:443

91.109.5.28:8080

70.32.94.58:8080

70.45.30.28:80

203.99.187.137:443

190.228.212.165:50000

51.38.134.203:8080

203.99.188.11:443

184.82.233.15:80

154.120.227.206:8080

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 22 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4c8ed6fcf357df57de0aee8b97fa4ba_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d4c8ed6fcf357df57de0aee8b97fa4ba_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2444
    • C:\Users\Admin\AppData\Local\Temp\d4c8ed6fcf357df57de0aee8b97fa4ba_JaffaCakes118.exe
      --476e14c8
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: RenamesItself
      • Suspicious use of SetWindowsHookEx
      PID:2828
  • C:\Windows\SysWOW64\dasmrcmodern.exe
    "C:\Windows\SysWOW64\dasmrcmodern.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2760
    • C:\Windows\SysWOW64\dasmrcmodern.exe
      --b5d07779
      2⤵
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2444-0-0x0000000000370000-0x0000000000387000-memory.dmp

    Filesize

    92KB

  • memory/2444-5-0x0000000000240000-0x0000000000251000-memory.dmp

    Filesize

    68KB

  • memory/2692-17-0x0000000000620000-0x0000000000637000-memory.dmp

    Filesize

    92KB

  • memory/2760-11-0x00000000003E0000-0x00000000003F7000-memory.dmp

    Filesize

    92KB

  • memory/2828-6-0x0000000001D80000-0x0000000001D97000-memory.dmp

    Filesize

    92KB

  • memory/2828-16-0x0000000000400000-0x000000000048B000-memory.dmp

    Filesize

    556KB