Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 02:29
Static task
static1
Behavioral task
behavioral1
Sample
df537c8d5df1dc0946f58aec2a3cad5e_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
df537c8d5df1dc0946f58aec2a3cad5e_JaffaCakes118.exe
-
Size
2.3MB
-
MD5
df537c8d5df1dc0946f58aec2a3cad5e
-
SHA1
fe1eb05c36a79bb69ba2426601fab0551b55cbaf
-
SHA256
4577691a01dbfeeec04082337a20f19b9a330f03bb1332c1f2340dbaf3734c0d
-
SHA512
3fd1159860aa3ab8a60a7cb5433b0b9ef97f9f13828630994023138829e044bb8f9771ee2f11a4dc02bf981a38b2570402b52cb832d408f407b68cc222ce0654
-
SSDEEP
49152:lLLLibBVPtqB2hidjT7jBsry/m8kev18rriaLC6YkqzIyiAbSLRU2bh4xm:lLfiP4BnvBsry/D39ci8QzIyiACzGxm
Malware Config
Extracted
danabot
89.44.9.132
64.188.23.70
179.43.133.35
45.147.231.218
89.45.4.126
Signatures
-
Danabot x86 payload 1 IoCs
Detection of Danabot x86 payload, mapped in memory during the execution of its loader.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\DF537C~1.DLL family_danabot -
Blocklisted process makes network request 8 IoCs
Processes:
rundll32.exeflow pid process 2 2784 rundll32.exe 3 2784 rundll32.exe 4 2784 rundll32.exe 5 2784 rundll32.exe 6 2784 rundll32.exe 7 2784 rundll32.exe 8 2784 rundll32.exe 11 2784 rundll32.exe -
Loads dropped DLL 5 IoCs
Processes:
regsvr32.exerundll32.exepid process 2480 regsvr32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
regsvr32.exerundll32.exedf537c8d5df1dc0946f58aec2a3cad5e_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df537c8d5df1dc0946f58aec2a3cad5e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
df537c8d5df1dc0946f58aec2a3cad5e_JaffaCakes118.exeregsvr32.exedescription pid process target process PID 2684 wrote to memory of 2480 2684 df537c8d5df1dc0946f58aec2a3cad5e_JaffaCakes118.exe regsvr32.exe PID 2684 wrote to memory of 2480 2684 df537c8d5df1dc0946f58aec2a3cad5e_JaffaCakes118.exe regsvr32.exe PID 2684 wrote to memory of 2480 2684 df537c8d5df1dc0946f58aec2a3cad5e_JaffaCakes118.exe regsvr32.exe PID 2684 wrote to memory of 2480 2684 df537c8d5df1dc0946f58aec2a3cad5e_JaffaCakes118.exe regsvr32.exe PID 2684 wrote to memory of 2480 2684 df537c8d5df1dc0946f58aec2a3cad5e_JaffaCakes118.exe regsvr32.exe PID 2684 wrote to memory of 2480 2684 df537c8d5df1dc0946f58aec2a3cad5e_JaffaCakes118.exe regsvr32.exe PID 2684 wrote to memory of 2480 2684 df537c8d5df1dc0946f58aec2a3cad5e_JaffaCakes118.exe regsvr32.exe PID 2480 wrote to memory of 2784 2480 regsvr32.exe rundll32.exe PID 2480 wrote to memory of 2784 2480 regsvr32.exe rundll32.exe PID 2480 wrote to memory of 2784 2480 regsvr32.exe rundll32.exe PID 2480 wrote to memory of 2784 2480 regsvr32.exe rundll32.exe PID 2480 wrote to memory of 2784 2480 regsvr32.exe rundll32.exe PID 2480 wrote to memory of 2784 2480 regsvr32.exe rundll32.exe PID 2480 wrote to memory of 2784 2480 regsvr32.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\df537c8d5df1dc0946f58aec2a3cad5e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\df537c8d5df1dc0946f58aec2a3cad5e_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe -s C:\Users\Admin\AppData\Local\Temp\DF537C~1.DLL f1 C:\Users\Admin\AppData\Local\Temp\DF537C~1.EXE@26842⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\DF537C~1.DLL,f03⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2784
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD507119b1790f56250fff9f87e81b96fc2
SHA1400e345b7566f4d7b8c5bd460b271864a934172d
SHA256fd9fd627f781017c2e5b375a3ac6b7f3f6e2c081d0ea093f281043d83ef04f09
SHA51226f852057938563c10c2289706b582c86622055041b47aae29a395947a1a457649b719630ec3c995d5edf4fd9a2c581ce4a52698fa3f7e1b9ce27b8728c87dfd