Analysis
-
max time kernel
144s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29-07-2024 19:56
Static task
static1
Behavioral task
behavioral1
Sample
5c7d93ea976f1f84ac8bef6e6065deca_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
5c7d93ea976f1f84ac8bef6e6065deca_JaffaCakes118.exe
-
Size
2.3MB
-
MD5
5c7d93ea976f1f84ac8bef6e6065deca
-
SHA1
22f9a5f7e38ac207f21287fa63f371a255a68c83
-
SHA256
76d9f06d6861a5fa03c02ca11c643684f51ba3372666b2f1541578f09c1d6d85
-
SHA512
0a64b6d8a6c87e0ea11c56b3542b229e97a4ffa6450a26456faa1b025a7ef5164f1b21bfceab04e5e480f893657c2bd65d6e1b6180f12b123783e1b19e0727b7
-
SSDEEP
49152:SgJyYd1z3uq8TsAO0Q3Lkxp8yzR0WdsIQP8hK6jEjZIBbKO:SgJyo3uq8Q0Q3LKp8CHdsIQ0o62Uv
Malware Config
Extracted
danabot
89.44.9.132
64.188.23.70
179.43.133.35
45.147.231.218
89.45.4.126
Signatures
-
Danabot x86 payload 1 IoCs
Detection of Danabot x86 payload, mapped in memory during the execution of its loader.
resource yara_rule behavioral1/files/0x00090000000120f1-8.dat family_danabot -
Blocklisted process makes network request 8 IoCs
flow pid Process 2 2900 rundll32.exe 3 2900 rundll32.exe 4 2900 rundll32.exe 5 2900 rundll32.exe 6 2900 rundll32.exe 7 2900 rundll32.exe 8 2900 rundll32.exe 9 2900 rundll32.exe -
Loads dropped DLL 5 IoCs
pid Process 2756 regsvr32.exe 2900 rundll32.exe 2900 rundll32.exe 2900 rundll32.exe 2900 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5c7d93ea976f1f84ac8bef6e6065deca_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2812 wrote to memory of 2756 2812 5c7d93ea976f1f84ac8bef6e6065deca_JaffaCakes118.exe 31 PID 2812 wrote to memory of 2756 2812 5c7d93ea976f1f84ac8bef6e6065deca_JaffaCakes118.exe 31 PID 2812 wrote to memory of 2756 2812 5c7d93ea976f1f84ac8bef6e6065deca_JaffaCakes118.exe 31 PID 2812 wrote to memory of 2756 2812 5c7d93ea976f1f84ac8bef6e6065deca_JaffaCakes118.exe 31 PID 2812 wrote to memory of 2756 2812 5c7d93ea976f1f84ac8bef6e6065deca_JaffaCakes118.exe 31 PID 2812 wrote to memory of 2756 2812 5c7d93ea976f1f84ac8bef6e6065deca_JaffaCakes118.exe 31 PID 2812 wrote to memory of 2756 2812 5c7d93ea976f1f84ac8bef6e6065deca_JaffaCakes118.exe 31 PID 2756 wrote to memory of 2900 2756 regsvr32.exe 32 PID 2756 wrote to memory of 2900 2756 regsvr32.exe 32 PID 2756 wrote to memory of 2900 2756 regsvr32.exe 32 PID 2756 wrote to memory of 2900 2756 regsvr32.exe 32 PID 2756 wrote to memory of 2900 2756 regsvr32.exe 32 PID 2756 wrote to memory of 2900 2756 regsvr32.exe 32 PID 2756 wrote to memory of 2900 2756 regsvr32.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c7d93ea976f1f84ac8bef6e6065deca_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5c7d93ea976f1f84ac8bef6e6065deca_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe -s C:\Users\Admin\AppData\Local\Temp\5C7D93~1.DLL f1 C:\Users\Admin\AppData\Local\Temp\5C7D93~1.EXE@28122⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\5C7D93~1.DLL,f03⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2900
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD507119b1790f56250fff9f87e81b96fc2
SHA1400e345b7566f4d7b8c5bd460b271864a934172d
SHA256fd9fd627f781017c2e5b375a3ac6b7f3f6e2c081d0ea093f281043d83ef04f09
SHA51226f852057938563c10c2289706b582c86622055041b47aae29a395947a1a457649b719630ec3c995d5edf4fd9a2c581ce4a52698fa3f7e1b9ce27b8728c87dfd