EmoKill is an Emotet process detection and killing tool for Windows OS.
It avoids wasting time after detection of Emotet. Any process that matches the pattern of Emotet based on the logic of EmoCheck by JPCERT/CC will be detected by EmoKill and killed as soon as possible.
Compiled version of EmoKill runs on Windows 64-bit and also on 32-bit machine.
- Download EmoKill.zip from the Releases page.
- Unpack the downloaded zip-file on your host.
- Install EmoKill as a windows service (Easiest way is to use
EmoKillConsole.exe
).
Please download from the Releases page.
The package of EmoKill consists of 3 program files and 1 config file:
- This is the main part of EmoKill, it runs as a windows service and contains the whole logic to detect and kill processes of Emotet.
- The config file allows you to configure settings for your environment.
- EmoKillConsole has a small menu that helps even inexperienced users to start.
- To see EmoKill in action without having an Emotet infection, this exe will be helpfull.
When EmoKill starts, there will be made a check of all running processes on your machine. After that every new started process will also be checked by EmoKill. Any process that matches the pattern of Emotet based on the logic of EmoCheck v0.0.2 by JPCERT/CC will be detected by EmoKill and killed as soon as possible. The time between detection and successful killing such a process is normaly less than 1 second.
Detection and killing of Emotet processes are logged to a logfile %programdata%\EmoKill\{computername}_Log.txt
and also to the application eventlog.
Additionally there will be created several json-files at folder %programdata%\EmoKill
:
{computername}_EmoCheck_Keywords_{timestamp}_{UID}.json
- Each file contains information about which process name is checked and killed (if detected). The source of the process name is the list of keywords.
{computername}_EmoCheck_Registry_{timestamp}_{UID}.json
- Each file contains information about which process name is checked and killed (if detected). The source of the process name is the registry.
{computername}_EmoCheck_Services_{timestamp}_{UID}.json
- Each file contains information about which process name is checked and killed (if detected). The source of the process name is the list of windows services.
{computername}_EmoCheck_Test_{timestamp}_{UID}.json
- Each file contains information about which process name is checked and killed (if detected). The source of the process name is the test scenario of EmoKill.
{computername}_EmoKill_{timestamp}_{UID}.json
- These files contains information about killed processes.
{computername}_SysInfo_{timestamp}_{UID}.json
- These files contain system information that may be helpful in troubleshooting.
After a reboot of your computer, the installed EmoKill service will automatically restart.
Since version 1.2.x it's possible to configure EmoKill.
For the following settings the possible values are true
or false
. It's recommended to leave all these settings as they are. Only if you encounter any problems you may try to disable appropriate setting by entering value false
.
<add key="JPCERT.Check.Keywords" value="true"/>
<add key="JPCERT.Check.Registry" value="true"/>
<add key="SOPHOS.Check.Services" value="true"/>
<add key="SOPHOS.Stop.Services" value="true"/>
<add key="SOPHOS.Disable.Services" value="true"/>
If you wish to collect the data on a shared folder, please specify a value for following key. The value should contain the unc path of a shared folder, where the json-files should be stored. The specified folder must exist, otherwise the json-files could not be stored there.
- Definition for NOT saving json-files on a shared folder (only local saving):
<add key="SharedDataFolder" value=""/>
- Definition for saving json-files on
\\Server\FolderWithAccess\EmoKill\SharedData
(you may customize the path according to your needs):
<add key="SharedDataFolder" value="\\Server\FolderWithAccess\EmoKill\SharedData"/>
Please regard: after changing config-file the service must be restartet to get the modified configuration.
- Start
EmoKillConsole.exe
(run as amdinistrator is required) - Select menuitem 1 (Install/Upadate and start EmoKill as Service)
Selecting the installation of the EmoKill as a windows service will do follwoing:
- program files are copied to the program files folder on your systemdrive
- after that the service will be installed with installutils.exe of the .NET-Framework
- and than the EmoKill service will be startet
That's all, EmoKill should be ready to detect and kill processes of Emotet.
You may use EmoKillTest.exe
to check and see how is EmoKill working on your machine.
- Stop EmoKill service if the service is running (i.e. menuitem 4 of
EmoKillConsole.exe
) - Start
EmoKillTest.exe
one or more times - Start EmoKill service (i.e. menuitem 3 of
EmoKillConsole.exe
) - All startet instances of
EmoKillTest.exe
should be killed in a few seconds
- Start the EmoKill service if the service is not running (i.e. menuitem 3 of
EmoKillConsole.exe
) - Start
EmoKillTest.exe
one or more times - All startet instances of
EmoKillTest.exe
should be killed in a few seconds
After Testing have a look to the application eventlog and/or to the logfile (i.e. menuitem 6 of EmoKillConsole.exe
).
EmoKill can only work correctly if the program runs with administrator privileges. This is necessary because EmoKill will be informed by the operating system about the creation of new windows processes. Without Administrator Privileges this is not possible!
Why should you trust EmoKill?
- EmoKill does only watch for windows processes and kills processes which match the pattern of Emotet as soon as possible!
- EmoKill is open source!
- many developers can check the code of EmoKill
- it's also possible for developers to decompile all components of EmoKill
- EmoKill runs only on the machine where it is installed!
- EmoKill needs no network connection!
- EmoKill needs no connection to the internet!
- EmoKill contains no ads, no malware, ..., and only well known third party components!
Detection of Emotet is also part of EmoKill and is based on the C++ code of EmoCheck v0.0.2 by JPCERT/CC.
Since version 1.2.x EmoKill detects also suspicious services as explained in the SOPHOS Knowledge Base: How to delete orphaned (Numeric) Emotet windows services. Furthermore default settings of EmoKill will stop and disable such suspicious services.
Informations are available at the Releases page.
Current version of EmoKill uses just one well known third party component.
- It's a popular high-performance JSON framework for .NET.
- Further informations may be found at the official website.
- Windows 10 1909 64bit German/English Edition
- Windows 10 1903 64bit German/English Edition
- Windows 10 1607 Enterprise 206 LTSB 64bit German/English Edition
- Windows 7 SP1 32bit German/English Edition
- Windows 7 SP1 64bit German/English Edition
- Windows 10 1909 64bit German Edition
- Microsoft Visual Studio Community 2017
Last but not least very many credits goes to:
- JPCERT/CC for releasing EmoCheck as open source.
- SOPHOS for there knowledge base article How to delete orphaned (Numeric) Emotet windows services.