Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 21:05
Static task
static1
Behavioral task
behavioral1
Sample
03428e1d5eab2e60eb8465545db5a48e_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
03428e1d5eab2e60eb8465545db5a48e_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
03428e1d5eab2e60eb8465545db5a48e
-
SHA1
6cc1a12e799e4e7251b3fa9e052dfc3ae954be43
-
SHA256
8ce823c7a2bd5e21c559c4bba91655079595b18ff77d52e105183d827d342637
-
SHA512
98441072dc02cfa8806d3ed56fb6a44a72fe8f841d4e558cc90a61456dc6a3bcc8151ab6a6a09f71e9ed7c65e0ee841eefc633bec6749e8210dd2b8228cc1b27
-
SSDEEP
24576:XCZmQFcWF4mumJedQJoih8UX6bYDhs1tHFCvFGZOHT09+gGIOTn3hVnkVa4Hi:fQFcatduiSGhs1tHFCvcZeTcgTRVn6i
Malware Config
Extracted
danabot
4
142.11.192.232:443
192.119.110.73:443
142.11.242.31:443
192.210.222.88:443
-
embedded_hash
F4711E27D559B4AEB1A081A1EB0AC465
-
type
loader
Signatures
-
Danabot Loader Component 10 IoCs
resource yara_rule behavioral2/files/0x000b000000023449-6.dat DanabotLoader2021 behavioral2/memory/812-11-0x0000000000400000-0x0000000000564000-memory.dmp DanabotLoader2021 behavioral2/memory/812-19-0x0000000000400000-0x0000000000564000-memory.dmp DanabotLoader2021 behavioral2/memory/812-20-0x0000000000400000-0x0000000000564000-memory.dmp DanabotLoader2021 behavioral2/memory/812-21-0x0000000000400000-0x0000000000564000-memory.dmp DanabotLoader2021 behavioral2/memory/812-22-0x0000000000400000-0x0000000000564000-memory.dmp DanabotLoader2021 behavioral2/memory/812-23-0x0000000000400000-0x0000000000564000-memory.dmp DanabotLoader2021 behavioral2/memory/812-24-0x0000000000400000-0x0000000000564000-memory.dmp DanabotLoader2021 behavioral2/memory/812-25-0x0000000000400000-0x0000000000564000-memory.dmp DanabotLoader2021 behavioral2/memory/812-26-0x0000000000400000-0x0000000000564000-memory.dmp DanabotLoader2021 -
Blocklisted process makes network request 1 IoCs
flow pid Process 42 812 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 812 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3308 3920 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 03428e1d5eab2e60eb8465545db5a48e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3920 wrote to memory of 812 3920 03428e1d5eab2e60eb8465545db5a48e_JaffaCakes118.exe 82 PID 3920 wrote to memory of 812 3920 03428e1d5eab2e60eb8465545db5a48e_JaffaCakes118.exe 82 PID 3920 wrote to memory of 812 3920 03428e1d5eab2e60eb8465545db5a48e_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\03428e1d5eab2e60eb8465545db5a48e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\03428e1d5eab2e60eb8465545db5a48e_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\03428E~1.DLL,s C:\Users\Admin\AppData\Local\Temp\03428E~1.EXE2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3920 -s 5042⤵
- Program crash
PID:3308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3920 -ip 39201⤵PID:2448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD56499b3bc720487f45c48a915d6ae7f07
SHA16add67121efb8bc94ab35de6b0f4c431b7ba0b65
SHA256506e6ed0fa6adab1d98264c442a632337bcca47fea960c7208b095acfe3eee4f
SHA5128c118eb775b4577063f4c8c348fe38ce58f444c0e53959c9be3dfee558b6cac8476a2f3ef1973476e086289b62b0b3e8fe26bf69e1a3850da5f82f962de7cc01