Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-10-2024 13:45
Static task
static1
Behavioral task
behavioral1
Sample
6ab90e18ff874ea42ede213f7c09da53_JaffaCakes118.dll
Resource
win7-20241010-en
General
-
Target
6ab90e18ff874ea42ede213f7c09da53_JaffaCakes118.dll
-
Size
1.5MB
-
MD5
6ab90e18ff874ea42ede213f7c09da53
-
SHA1
d7ebf67c32c5f61f73902206bbc770b1e9088b38
-
SHA256
4736d24aa94d36bbcce3e251bb39cde25e85440460fba55b4ae959fced09557e
-
SHA512
05e195e3baee9104cde2821fa227e028a3da831f57a0b9b9706226717500aa415243407c073c8d2011c000e1c4d1c5d4136c2215636e0d07b775dd817c166d6b
-
SSDEEP
24576:NiefPX096ZbBI9a2V/YZTShjCfAFJcNsF5KiIBuZ0vbFaiLWsqPACEoGgt:Ieff+689a2V/YhYjuAFigOBuZ0jwqWAs
Malware Config
Extracted
danabot
11
35.226.27.224:443
178.62.118.134:443
34.129.5.173:443
-
embedded_hash
3492DFC41EECF90D1A225ED6289D9813
-
type
loader
Signatures
-
Danabot Loader Component 16 IoCs
Processes:
resource yara_rule behavioral2/memory/224-2-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral2/memory/224-4-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral2/memory/224-5-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral2/memory/224-6-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral2/memory/224-7-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral2/memory/224-8-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral2/memory/224-9-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral2/memory/224-10-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral2/memory/224-11-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral2/memory/224-12-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral2/memory/224-13-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral2/memory/224-14-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral2/memory/224-15-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral2/memory/224-16-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral2/memory/224-17-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 behavioral2/memory/224-18-0x0000000010000000-0x0000000010235000-memory.dmp DanabotLoader2021 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
regsvr32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid process target process PID 1848 wrote to memory of 224 1848 regsvr32.exe regsvr32.exe PID 1848 wrote to memory of 224 1848 regsvr32.exe regsvr32.exe PID 1848 wrote to memory of 224 1848 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\6ab90e18ff874ea42ede213f7c09da53_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\6ab90e18ff874ea42ede213f7c09da53_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:224
-