Analysis
-
max time kernel
141s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-10-2024 05:49
Behavioral task
behavioral1
Sample
5b2251a0a91f05ab892d45c512086d03_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
5b2251a0a91f05ab892d45c512086d03_JaffaCakes118.dll
-
Size
1.3MB
-
MD5
5b2251a0a91f05ab892d45c512086d03
-
SHA1
e86d1fdb9718856434e8fd939481301cecdf1719
-
SHA256
80cfe0fddd49fca8e48da5b4580f3646a1e0813ece76872dc015971c55f1ed8d
-
SHA512
caf6aa2fb3a4343c30684b38fc2155aaac26decf76e9fbd02211bd90dc3487c9919bfc74abc3f71e95892b180db04ce27b3e2498826ba84a7baa8e0d3c0d794e
-
SSDEEP
24576:EncFdn7rbCc1XupdscfiyWj16Y2dZ5+dxjw2oVT1h:bne6x56xG0NT
Malware Config
Extracted
danabot
4
23.254.144.209:443
192.236.194.86:443
142.11.192.232:443
-
embedded_hash
0E1A7A1479C37094441FA911262B322A
-
type
loader
Signatures
-
Danabot Loader Component 14 IoCs
Processes:
resource yara_rule behavioral2/memory/2768-0-0x0000000000400000-0x0000000000563000-memory.dmp DanabotLoader2021 behavioral2/memory/2768-1-0x0000000000400000-0x0000000000563000-memory.dmp DanabotLoader2021 behavioral2/memory/2768-2-0x0000000000400000-0x0000000000563000-memory.dmp DanabotLoader2021 behavioral2/memory/2768-3-0x0000000000400000-0x0000000000563000-memory.dmp DanabotLoader2021 behavioral2/memory/2768-4-0x0000000000400000-0x0000000000563000-memory.dmp DanabotLoader2021 behavioral2/memory/2768-5-0x0000000000400000-0x0000000000563000-memory.dmp DanabotLoader2021 behavioral2/memory/2768-6-0x0000000000400000-0x0000000000563000-memory.dmp DanabotLoader2021 behavioral2/memory/2768-7-0x0000000000400000-0x0000000000563000-memory.dmp DanabotLoader2021 behavioral2/memory/2768-8-0x0000000000400000-0x0000000000563000-memory.dmp DanabotLoader2021 behavioral2/memory/2768-9-0x0000000000400000-0x0000000000563000-memory.dmp DanabotLoader2021 behavioral2/memory/2768-10-0x0000000000400000-0x0000000000563000-memory.dmp DanabotLoader2021 behavioral2/memory/2768-11-0x0000000000400000-0x0000000000563000-memory.dmp DanabotLoader2021 behavioral2/memory/2768-12-0x0000000000400000-0x0000000000563000-memory.dmp DanabotLoader2021 behavioral2/memory/2768-13-0x0000000000400000-0x0000000000563000-memory.dmp DanabotLoader2021 -
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 1 2768 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 540 wrote to memory of 2768 540 rundll32.exe rundll32.exe PID 540 wrote to memory of 2768 540 rundll32.exe rundll32.exe PID 540 wrote to memory of 2768 540 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5b2251a0a91f05ab892d45c512086d03_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5b2251a0a91f05ab892d45c512086d03_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2768
-