Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 08:23
Behavioral task
behavioral1
Sample
fc55d7afa5ad97587a0d02965e69501b_JaffaCakes118.dll
Resource
win7-20240221-en
windows7-x64
3 signatures
150 seconds
General
-
Target
fc55d7afa5ad97587a0d02965e69501b_JaffaCakes118.dll
-
Size
1.3MB
-
MD5
fc55d7afa5ad97587a0d02965e69501b
-
SHA1
e485195a77d6ac84189da82c088698e3118d01bb
-
SHA256
dbf7ee1c646a64f9b4aea4b4180b15a91fa4e31b7e35bb2ed2a3e65301db98d6
-
SHA512
e03bb1a1c018811a5f4f93f5206a25c2de8b9de8763b2847e07770cc7fc763300662e5e642706e90ccae6a8ea4ea17ad9ebd8392ee95b5946397605389d5f303
-
SSDEEP
24576:0IhaxlfjpVpSyBbYqx+RCwO6p8dDdPC7leTYuT+Pti:ruRDa4wpp8dscPTUti
Malware Config
Extracted
Family
danabot
Botnet
4
C2
142.11.244.124:443
142.11.206.50:443
Attributes
-
embedded_hash
6AD9FE4F9E491E785665E0D144F61DAB
-
type
loader
rsa_pubkey.plain
rsa_privkey.plain
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid Process 5 2812 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid Process procid_target PID 4412 wrote to memory of 2812 4412 rundll32.exe 86 PID 4412 wrote to memory of 2812 4412 rundll32.exe 86 PID 4412 wrote to memory of 2812 4412 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fc55d7afa5ad97587a0d02965e69501b_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fc55d7afa5ad97587a0d02965e69501b_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
PID:2812
-