Analysis
-
max time kernel
140s -
max time network
40s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-10-2024 13:45
Static task
static1
Behavioral task
behavioral1
Sample
6ab90e18ff874ea42ede213f7c09da53_JaffaCakes118.dll
Resource
win7-20241010-en
General
-
Target
6ab90e18ff874ea42ede213f7c09da53_JaffaCakes118.dll
-
Size
1.5MB
-
MD5
6ab90e18ff874ea42ede213f7c09da53
-
SHA1
d7ebf67c32c5f61f73902206bbc770b1e9088b38
-
SHA256
4736d24aa94d36bbcce3e251bb39cde25e85440460fba55b4ae959fced09557e
-
SHA512
05e195e3baee9104cde2821fa227e028a3da831f57a0b9b9706226717500aa415243407c073c8d2011c000e1c4d1c5d4136c2215636e0d07b775dd817c166d6b
-
SSDEEP
24576:NiefPX096ZbBI9a2V/YZTShjCfAFJcNsF5KiIBuZ0vbFaiLWsqPACEoGgt:Ieff+689a2V/YhYjuAFigOBuZ0jwqWAs
Malware Config
Extracted
danabot
11
35.226.27.224:443
178.62.118.134:443
34.129.5.173:443
-
embedded_hash
3492DFC41EECF90D1A225ED6289D9813
-
type
loader
Signatures
-
Danabot Loader Component 15 IoCs
resource yara_rule behavioral1/memory/2792-1-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral1/memory/2792-3-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral1/memory/2792-4-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral1/memory/2792-5-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral1/memory/2792-6-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral1/memory/2792-7-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral1/memory/2792-8-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral1/memory/2792-9-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral1/memory/2792-10-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral1/memory/2792-11-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral1/memory/2792-12-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral1/memory/2792-13-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral1/memory/2792-14-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral1/memory/2792-15-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral1/memory/2792-16-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2792 1680 regsvr32.exe 30 PID 1680 wrote to memory of 2792 1680 regsvr32.exe 30 PID 1680 wrote to memory of 2792 1680 regsvr32.exe 30 PID 1680 wrote to memory of 2792 1680 regsvr32.exe 30 PID 1680 wrote to memory of 2792 1680 regsvr32.exe 30 PID 1680 wrote to memory of 2792 1680 regsvr32.exe 30 PID 1680 wrote to memory of 2792 1680 regsvr32.exe 30
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\6ab90e18ff874ea42ede213f7c09da53_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\6ab90e18ff874ea42ede213f7c09da53_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:2792
-