Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 08:08
Behavioral task
behavioral1
Sample
f9e0642b0e36d83c2c58953619e6f4c5_JaffaCakes118.dll
Resource
win7-20240221-en
windows7-x64
3 signatures
150 seconds
General
-
Target
f9e0642b0e36d83c2c58953619e6f4c5_JaffaCakes118.dll
-
Size
1.3MB
-
MD5
f9e0642b0e36d83c2c58953619e6f4c5
-
SHA1
b00c21cc5e56f77472313ea1017d0db97f1e5c86
-
SHA256
7e93386b0f4aee6ba5dba9b29ebbf2926c99a83ff57e4f7719d652e2b0ba301f
-
SHA512
25675403947478631855fb9008f1f9234843f3bdfaab816570dfe10549d22651a2b0a1c408ff6094db062cf3272bdf0cd6d14ff91099fc36bf9bab708001c104
-
SSDEEP
24576:1ncFd4/jGahKXNsix1g9zbu8e/3FiE+TCzgcAw:SEs+buX7+TNZ
Malware Config
Extracted
Family
danabot
Botnet
4
C2
142.11.192.232:443
192.119.110.73:443
142.11.242.31:443
192.210.222.88:443
Attributes
-
embedded_hash
F4711E27D559B4AEB1A081A1EB0AC465
-
type
loader
rsa_pubkey.plain
rsa_privkey.plain
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid Process 7 1716 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid Process procid_target PID 4932 wrote to memory of 1716 4932 rundll32.exe 83 PID 4932 wrote to memory of 1716 4932 rundll32.exe 83 PID 4932 wrote to memory of 1716 4932 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f9e0642b0e36d83c2c58953619e6f4c5_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f9e0642b0e36d83c2c58953619e6f4c5_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
PID:1716
-