ServiceMain
TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
f0
f1
f2
f3
f4
f5
f6
f7
f8
f9
t1
Windows 7 will be removed from tria.ge on 2025-03-31
Behavioral task
behavioral1
Sample
ab7dbbf3b7146aea68cb674376eb61c8_JaffaCakes118.dll
Resource
win7-20231129-en
Target
ab7dbbf3b7146aea68cb674376eb61c8_JaffaCakes118
Size
1.4MB
MD5
ab7dbbf3b7146aea68cb674376eb61c8
SHA1
072c3aa96981ab83bd400151b3bcd219e8ea777a
SHA256
330230b667873603377f0802abf01af99a778330b30b6190174a13c1aa1808f5
SHA512
9801d142820f33aede76d6250f17da133e4a31d7f57defd41c92c32cfc09804cb13d7e4e6759c63a319855d57a293a13c7680ef24bed14a095854828f5e12259
SSDEEP
24576:a5PGEeH9dbe5+EMO5+l+uQ7QR54DpxL9:GzYFeX+lwRDvL9
danabot
236.34.98.36
184.82.0.199
99.142.111.190
11.202.75.114
98.208.224.126
191.90.126.19
20.31.15.28
195.123.220.45
149.154.159.213
248.83.33.201
Detection of Danabot x86 payload, mapped in memory during the execution of its loader.
resource | yara_rule |
---|---|
sample | family_danabot |
Checks for missing Authenticode signature.
resource |
---|
ab7dbbf3b7146aea68cb674376eb61c8_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
SysFreeString
SysReAllocStringLen
SysAllocStringLen
SafeArrayPtrOfIndex
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayCreate
VariantChangeType
VariantCopy
VariantClear
VariantInit
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
SetSecurityDescriptorDacl
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
OpenThreadToken
OpenProcessToken
LookupAccountSidW
IsValidSid
InitializeSecurityDescriptor
InitializeAcl
GetTokenInformation
GetSidSubAuthorityCount
GetSidSubAuthority
GetCurrentHwProfileW
FreeSid
EqualSid
AllocateAndInitializeSid
AddAccessAllowedAce
CreateWellKnownSid
CryptVerifySignatureW
CryptDecrypt
CryptImportKey
CryptEncrypt
CryptDeriveKey
CryptDestroyKey
CryptExportKey
CryptGenKey
CryptReleaseContext
CryptDestroyHash
CryptGetHashParam
CryptHashData
CryptCreateHash
CryptAcquireContextA
CharNextW
LoadStringW
CreateWindowExW
UpdateWindow
TranslateMessage
ShowWindow
SendMessageA
RegisterClassW
PeekMessageW
MsgWaitForMultipleObjects
MessageBoxW
LoadStringW
LoadIconW
LoadCursorW
IsWindowVisible
GetWindowThreadProcessId
GetSystemMetrics
GetWindow
GetMessageW
FindWindowA
FindWindowW
DispatchMessageW
DefWindowProcW
CharUpperBuffW
CharUpperW
CharLowerBuffW
Sleep
VirtualFree
VirtualAlloc
lstrlenW
VirtualQuery
GetTickCount
GetSystemInfo
GetVersion
CompareStringW
IsValidLocale
SetThreadLocale
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
GetLocaleInfoW
WideCharToMultiByte
MultiByteToWideChar
GetACP
LoadLibraryExW
GetStartupInfoW
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetCommandLineW
FreeLibrary
GetLastError
UnhandledExceptionFilter
RtlUnwind
RaiseException
ExitProcess
ExitThread
SwitchToThread
GetCurrentThreadId
CreateThread
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
FindFirstFileW
FindClose
WriteFile
GetStdHandle
CloseHandle
GetProcAddress
RaiseException
LoadLibraryA
GetLastError
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
LocalFree
LocalAlloc
FreeLibrary
WriteProcessMemory
WriteFile
WideCharToMultiByte
WaitForSingleObject
VirtualQueryEx
VirtualQuery
VirtualProtect
VirtualFree
VirtualAlloc
VerSetConditionMask
VerifyVersionInfoW
TerminateThread
TerminateProcess
SwitchToThread
SuspendThread
Sleep
SetThreadPriority
SetLastError
SetFilePointer
SetFileAttributesW
SetEvent
SetEndOfFile
ResumeThread
ResetEvent
ReadProcessMemory
ReadFile
RaiseException
QueryPerformanceCounter
IsDebuggerPresent
OpenProcess
MultiByteToWideChar
LocalFree
LocalAlloc
LoadLibraryA
LoadLibraryW
IsValidLocale
IsBadReadPtr
HeapSize
HeapFree
HeapDestroy
HeapCreate
HeapAlloc
GetWindowsDirectoryW
GetVolumeInformationW
GetVersionExW
GetTickCount
GetThreadPriority
GetThreadLocale
GetSystemDirectoryW
GetStdHandle
GetShortPathNameW
GetProcessHeap
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetLocaleInfoW
GetLocalTime
GetLastError
GetFullPathNameW
GetFileSizeEx
GetExitCodeThread
GetDiskFreeSpaceExW
GetDiskFreeSpaceW
GetDateFormatW
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
GetComputerNameW
GetCommandLineW
GetCPInfoExW
GetCPInfo
GetACP
FreeLibrary
FormatMessageW
FindFirstFileW
EnumSystemLocalesW
EnumCalendarInfoW
DeleteFileW
CreateThread
CreateProcessW
CreateFileW
CreateEventW
CreateDirectoryW
CompareStringW
CloseHandle
Sleep
GetStockObject
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
WSASend
WSAIoctl
WSAEventSelect
WSAStartup
socket
shutdown
send
recv
inet_addr
htons
ioctlsocket
connect
closesocket
ShellExecuteExW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHGetSpecialFolderPathW
InternetSetOptionW
InternetOpenW
NetApiBufferFree
NetWkstaGetInfo
CoCreateInstance
CoInitialize
RtlAllocateHeap
ServiceMain
TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
f0
f1
f2
f3
f4
f5
f6
f7
f8
f9
t1
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ