Analysis
-
max time kernel
140s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 14:15
Behavioral task
behavioral1
Sample
bdc533020cedadeef328b0356357e3ed_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
bdc533020cedadeef328b0356357e3ed_JaffaCakes118.dll
-
Size
1.3MB
-
MD5
bdc533020cedadeef328b0356357e3ed
-
SHA1
ec2fcae1c1757de2e7bbb575fd5272b1504f26e2
-
SHA256
b76b4117dcde1bf0f99b8c3c5e31fa4bc937e137d44fd6f8db6ed5fe7f97fc64
-
SHA512
1d6282d490473f3b6e8c632a49aeb9c0f3695b6cdffb18b6e6f96d88b51eb0cb5e181ff559720bd24f97e9ebfd51c85a3da31f63ec039ccf7c95aa6aafd1ec5c
-
SSDEEP
24576:FcFXBQxFG8IUrRMB2Bz7OPZk4Cu0eTrkyuw:mcC53LP+4C8Toyl
Malware Config
Extracted
danabot
4
142.11.244.124:443
142.11.206.50:443
-
embedded_hash
6AD9FE4F9E491E785665E0D144F61DAB
-
type
loader
Signatures
-
Danabot Loader Component 14 IoCs
Processes:
resource yara_rule behavioral2/memory/3652-0-0x0000000000400000-0x000000000055D000-memory.dmp DanabotLoader2021 behavioral2/memory/3652-1-0x0000000000400000-0x000000000055D000-memory.dmp DanabotLoader2021 behavioral2/memory/3652-2-0x0000000000400000-0x000000000055D000-memory.dmp DanabotLoader2021 behavioral2/memory/3652-3-0x0000000000400000-0x000000000055D000-memory.dmp DanabotLoader2021 behavioral2/memory/3652-4-0x0000000000400000-0x000000000055D000-memory.dmp DanabotLoader2021 behavioral2/memory/3652-5-0x0000000000400000-0x000000000055D000-memory.dmp DanabotLoader2021 behavioral2/memory/3652-6-0x0000000000400000-0x000000000055D000-memory.dmp DanabotLoader2021 behavioral2/memory/3652-7-0x0000000000400000-0x000000000055D000-memory.dmp DanabotLoader2021 behavioral2/memory/3652-8-0x0000000000400000-0x000000000055D000-memory.dmp DanabotLoader2021 behavioral2/memory/3652-9-0x0000000000400000-0x000000000055D000-memory.dmp DanabotLoader2021 behavioral2/memory/3652-10-0x0000000000400000-0x000000000055D000-memory.dmp DanabotLoader2021 behavioral2/memory/3652-11-0x0000000000400000-0x000000000055D000-memory.dmp DanabotLoader2021 behavioral2/memory/3652-12-0x0000000000400000-0x000000000055D000-memory.dmp DanabotLoader2021 behavioral2/memory/3652-13-0x0000000000400000-0x000000000055D000-memory.dmp DanabotLoader2021 -
Danabot family
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid Process 3 3652 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid Process procid_target PID 1708 wrote to memory of 3652 1708 rundll32.exe 82 PID 1708 wrote to memory of 3652 1708 rundll32.exe 82 PID 1708 wrote to memory of 3652 1708 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bdc533020cedadeef328b0356357e3ed_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bdc533020cedadeef328b0356357e3ed_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:3652
-