Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 16:37
Static task
static1
Behavioral task
behavioral1
Sample
f0345563ece05e441e96aa1cbfeb4edd_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
f0345563ece05e441e96aa1cbfeb4edd_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
f0345563ece05e441e96aa1cbfeb4edd
-
SHA1
ab4aa38faaae74314ae8b54ab28b77d7d75c1522
-
SHA256
b6b8c3786d083acd1def5d1ca92b0c505981bde8ce2304d6d159c142376f66a0
-
SHA512
5ef94563596e49d74b8e6c908971296b8b871ac576274d98e7af80b8c0d440e9de218c258330dadb9a6a7c0cd889c9c01479d4dea1dd410911e4eeedc6cc684e
-
SSDEEP
24576:8mbCS2RwYk7DfBFjcG7hZiSR7kb0n+iIUWu+NCyMwnEq89t2Rca:8mbC5wpcG7h500VWu+NHVnr89J
Malware Config
Extracted
danabot
45.74.187.0
146.1.214.150
158.228.122.53
202.136.199.125
149.28.180.182
4.79.227.177
44.151.109.26
178.209.51.211
167.196.69.157
149.143.183.11
Signatures
-
Danabot x86 payload 1 IoCs
Detection of Danabot x86 payload, mapped in memory during the execution of its loader.
Processes:
resource yara_rule behavioral2/files/0x0009000000023447-2.dat family_danabot -
Blocklisted process makes network request 8 IoCs
Processes:
rundll32.exeflow pid Process 7 3504 rundll32.exe 23 3504 rundll32.exe 37 3504 rundll32.exe 38 3504 rundll32.exe 42 3504 rundll32.exe 47 3504 rundll32.exe 48 3504 rundll32.exe 50 3504 rundll32.exe -
Deletes itself 1 IoCs
Processes:
regsvr32.exepid Process 2516 regsvr32.exe -
Loads dropped DLL 3 IoCs
Processes:
regsvr32.exerundll32.exepid Process 2516 regsvr32.exe 3504 rundll32.exe 3504 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
f0345563ece05e441e96aa1cbfeb4edd_JaffaCakes118.exeregsvr32.exerundll32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f0345563ece05e441e96aa1cbfeb4edd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
f0345563ece05e441e96aa1cbfeb4edd_JaffaCakes118.exeregsvr32.exedescription pid Process procid_target PID 3528 wrote to memory of 2516 3528 f0345563ece05e441e96aa1cbfeb4edd_JaffaCakes118.exe 83 PID 3528 wrote to memory of 2516 3528 f0345563ece05e441e96aa1cbfeb4edd_JaffaCakes118.exe 83 PID 3528 wrote to memory of 2516 3528 f0345563ece05e441e96aa1cbfeb4edd_JaffaCakes118.exe 83 PID 2516 wrote to memory of 3504 2516 regsvr32.exe 84 PID 2516 wrote to memory of 3504 2516 regsvr32.exe 84 PID 2516 wrote to memory of 3504 2516 regsvr32.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0345563ece05e441e96aa1cbfeb4edd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f0345563ece05e441e96aa1cbfeb4edd_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe -s C:\Users\Admin\AppData\Local\Temp\F03455~1.DLL f1 C:\Users\Admin\AppData\Local\Temp\F03455~1.EXE@35282⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\F03455~1.DLL,f03⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3504
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5912ae7819075827b6301cc93c9bc9c70
SHA1baa650f63b51213dc9facebc8b0bccb87ba2df90
SHA256be9ed9c0db43a369c641d80b674009c9c42c8b8bb3700be51f5a531d64454826
SHA5123ad9287f6543afb0c033984037f11482f48ab93725413796a1a67738503a80864bb0ed73865f90901538d8e0f7733f1201c68d3e4a9468bebd9abb064cbff599