Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 20:52
Static task
static1
Behavioral task
behavioral1
Sample
fb24cb12e0315ba0c5c8a0add05baa88_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
fb24cb12e0315ba0c5c8a0add05baa88_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
fb24cb12e0315ba0c5c8a0add05baa88
-
SHA1
e46da0e271242aaf70143892136e7280d19da266
-
SHA256
40edb22b5967cfeb7b56ff2bd41a97fdeabbfd2a2cb7c7b2020c402f2274e325
-
SHA512
0a3394320165b8ed3486e9c74fcd923a9658315dd48c72585cb12b5a1df7e79d2292c8017a97065b009520a52202c4f730366faaaaf465f7d039602deb4a0459
-
SSDEEP
24576:nztkoD42cMZ4rTy5rhwuR5M71Il9+zudfik4LjE5cukYIMSilA:pTR5rhwuR5SXuUFjgjIMJ
Malware Config
Extracted
danabot
4
142.11.244.124:443
142.11.206.50:443
-
embedded_hash
6AD9FE4F9E491E785665E0D144F61DAB
-
type
loader
Signatures
-
Danabot Loader Component 11 IoCs
Processes:
resource yara_rule behavioral2/files/0x000b0000000233f4-5.dat DanabotLoader2021 behavioral2/memory/4260-8-0x0000000002270000-0x00000000023CF000-memory.dmp DanabotLoader2021 behavioral2/memory/4260-12-0x0000000002270000-0x00000000023CF000-memory.dmp DanabotLoader2021 behavioral2/memory/4260-20-0x0000000002270000-0x00000000023CF000-memory.dmp DanabotLoader2021 behavioral2/memory/4260-21-0x0000000002270000-0x00000000023CF000-memory.dmp DanabotLoader2021 behavioral2/memory/4260-22-0x0000000002270000-0x00000000023CF000-memory.dmp DanabotLoader2021 behavioral2/memory/4260-23-0x0000000002270000-0x00000000023CF000-memory.dmp DanabotLoader2021 behavioral2/memory/4260-24-0x0000000002270000-0x00000000023CF000-memory.dmp DanabotLoader2021 behavioral2/memory/4260-25-0x0000000002270000-0x00000000023CF000-memory.dmp DanabotLoader2021 behavioral2/memory/4260-26-0x0000000002270000-0x00000000023CF000-memory.dmp DanabotLoader2021 behavioral2/memory/4260-27-0x0000000002270000-0x00000000023CF000-memory.dmp DanabotLoader2021 -
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid Process 67 4260 rundll32.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exepid Process 4260 rundll32.exe 4260 rundll32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 4332 4724 WerFault.exe 83 -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
fb24cb12e0315ba0c5c8a0add05baa88_JaffaCakes118.exedescription pid Process procid_target PID 4724 wrote to memory of 4260 4724 fb24cb12e0315ba0c5c8a0add05baa88_JaffaCakes118.exe 87 PID 4724 wrote to memory of 4260 4724 fb24cb12e0315ba0c5c8a0add05baa88_JaffaCakes118.exe 87 PID 4724 wrote to memory of 4260 4724 fb24cb12e0315ba0c5c8a0add05baa88_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb24cb12e0315ba0c5c8a0add05baa88_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fb24cb12e0315ba0c5c8a0add05baa88_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\FB24CB~1.TMP,S C:\Users\Admin\AppData\Local\Temp\FB24CB~1.EXE2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:4260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4724 -s 4482⤵
- Program crash
PID:4332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4724 -ip 47241⤵PID:2872
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD50c13e3cdc49f0ff630b1b88cd02c3fe1
SHA19fc58ec62a89813ea0bf9eee4d507895c63be46a
SHA256785514ebf057bf14ef8a67d20fcf3665d1b5940749eb35ea80ca0b1e2d5dbad4
SHA5122f58f036b9bb38dde803b13dcde2371517f625108dcd08488ce909fa4e893d3750e1b8b7e39087dc99b0260e6f5ff9433f48c939bbc9373f3e4e93a20790e8d0