Analysis
-
max time kernel
141s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 19:06
Static task
static1
Behavioral task
behavioral1
Sample
4190fb8de9d6a4200750b4d8d54f0720_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
4190fb8de9d6a4200750b4d8d54f0720_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
4190fb8de9d6a4200750b4d8d54f0720
-
SHA1
5385fd2aee08a6063dd0527ff8a07d74f8bb61b8
-
SHA256
32b613fc579cc69e56997a4f3c41fd55b98ceb789d324408f450c2b6ad6d03bd
-
SHA512
fdaafd89eac9b7f7a540038dbce48cf0e39c4aaa78dfbd6b0b45041386b23f64f827d5e51910fd4b2b7dc4ebde76a5c8ef8a9b9859cb5ca5a1ef4c84b5fdb033
-
SSDEEP
24576:iv3TbcUVydzoxg50b5SS4SnEynTd+2yda5ZJBWJBrYurUE/I:ivHc5zOgOfVnEsZ1MajusuYD
Malware Config
Extracted
danabot
4
142.11.244.124:443
142.11.206.50:443
-
embedded_hash
6AD9FE4F9E491E785665E0D144F61DAB
-
type
loader
Signatures
-
Danabot Loader Component 11 IoCs
resource yara_rule behavioral2/files/0x000d000000023b6d-6.dat DanabotLoader2021 behavioral2/memory/3604-9-0x0000000002440000-0x000000000259E000-memory.dmp DanabotLoader2021 behavioral2/memory/3604-13-0x0000000002440000-0x000000000259E000-memory.dmp DanabotLoader2021 behavioral2/memory/3604-21-0x0000000002440000-0x000000000259E000-memory.dmp DanabotLoader2021 behavioral2/memory/3604-22-0x0000000002440000-0x000000000259E000-memory.dmp DanabotLoader2021 behavioral2/memory/3604-23-0x0000000002440000-0x000000000259E000-memory.dmp DanabotLoader2021 behavioral2/memory/3604-24-0x0000000002440000-0x000000000259E000-memory.dmp DanabotLoader2021 behavioral2/memory/3604-25-0x0000000002440000-0x000000000259E000-memory.dmp DanabotLoader2021 behavioral2/memory/3604-26-0x0000000002440000-0x000000000259E000-memory.dmp DanabotLoader2021 behavioral2/memory/3604-27-0x0000000002440000-0x000000000259E000-memory.dmp DanabotLoader2021 behavioral2/memory/3604-28-0x0000000002440000-0x000000000259E000-memory.dmp DanabotLoader2021 -
Blocklisted process makes network request 1 IoCs
flow pid Process 37 3604 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 3604 rundll32.exe 3604 rundll32.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2600 1852 WerFault.exe 83 4984 1852 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4190fb8de9d6a4200750b4d8d54f0720_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1852 wrote to memory of 3604 1852 4190fb8de9d6a4200750b4d8d54f0720_JaffaCakes118.exe 86 PID 1852 wrote to memory of 3604 1852 4190fb8de9d6a4200750b4d8d54f0720_JaffaCakes118.exe 86 PID 1852 wrote to memory of 3604 1852 4190fb8de9d6a4200750b4d8d54f0720_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\4190fb8de9d6a4200750b4d8d54f0720_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4190fb8de9d6a4200750b4d8d54f0720_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\4190FB~1.TMP,S C:\Users\Admin\AppData\Local\Temp\4190FB~1.EXE2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 5002⤵
- Program crash
PID:2600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 5242⤵
- Program crash
PID:4984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1852 -ip 18521⤵PID:3632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1852 -ip 18521⤵PID:1692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD500ad9c8b149b8e232e36c5823d73dcb4
SHA1c8e1a519720ab5acb40766a0f985448e83a5a241
SHA25623c285510f0c90b0905e5b48efff7bfa34697cca098296e68d16aa391e0d42c7
SHA512472c1c518221d730a9206b02028fe4f191de4c3cc0003b624ea70795ec2292f8c7522442f8ea4d81a4c0667dc1b7087e463e8abd6d35465ae456d66f4c2d09a4