Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 03:42
Behavioral task
behavioral1
Sample
7f0b203d930a150e237b9e769ed50865_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
7f0b203d930a150e237b9e769ed50865_JaffaCakes118.dll
-
Size
1.3MB
-
MD5
7f0b203d930a150e237b9e769ed50865
-
SHA1
000d07a203f54cd184f5fb56f8b0e6a42d6d21e2
-
SHA256
25d429d77c4204623d25ac21bfa80cdafc954b727255131605ec70eb0b07cac8
-
SHA512
03bdf66861c46b8e4c79a35f48c32e50807a5ca3f94f2feee76719865e12dff8e2f0553fee960dc6fcffb65cc42d0f3fa36d740b9deb845915bc5815060e6f2c
-
SSDEEP
24576:t8pWEmX5bH7jkT6O6YqtpFC38c1RMIovHg8RvTqnv4k:uSo38c1e1vxTmv
Malware Config
Extracted
danabot
4
23.229.29.48:443
5.9.224.204:443
192.255.166.212:443
-
embedded_hash
0E1A7A1479C37094441FA911262B322A
-
type
loader
Signatures
-
Danabot Loader Component 14 IoCs
resource yara_rule behavioral2/memory/624-0-0x0000000000400000-0x0000000000562000-memory.dmp DanabotLoader2021 behavioral2/memory/624-1-0x0000000000400000-0x0000000000562000-memory.dmp DanabotLoader2021 behavioral2/memory/624-2-0x0000000000400000-0x0000000000562000-memory.dmp DanabotLoader2021 behavioral2/memory/624-3-0x0000000000400000-0x0000000000562000-memory.dmp DanabotLoader2021 behavioral2/memory/624-4-0x0000000000400000-0x0000000000562000-memory.dmp DanabotLoader2021 behavioral2/memory/624-5-0x0000000000400000-0x0000000000562000-memory.dmp DanabotLoader2021 behavioral2/memory/624-6-0x0000000000400000-0x0000000000562000-memory.dmp DanabotLoader2021 behavioral2/memory/624-7-0x0000000000400000-0x0000000000562000-memory.dmp DanabotLoader2021 behavioral2/memory/624-8-0x0000000000400000-0x0000000000562000-memory.dmp DanabotLoader2021 behavioral2/memory/624-9-0x0000000000400000-0x0000000000562000-memory.dmp DanabotLoader2021 behavioral2/memory/624-10-0x0000000000400000-0x0000000000562000-memory.dmp DanabotLoader2021 behavioral2/memory/624-11-0x0000000000400000-0x0000000000562000-memory.dmp DanabotLoader2021 behavioral2/memory/624-12-0x0000000000400000-0x0000000000562000-memory.dmp DanabotLoader2021 behavioral2/memory/624-13-0x0000000000400000-0x0000000000562000-memory.dmp DanabotLoader2021 -
Blocklisted process makes network request 1 IoCs
flow pid Process 1 624 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1712 wrote to memory of 624 1712 rundll32.exe 83 PID 1712 wrote to memory of 624 1712 rundll32.exe 83 PID 1712 wrote to memory of 624 1712 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7f0b203d930a150e237b9e769ed50865_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7f0b203d930a150e237b9e769ed50865_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:624
-