Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2024 08:55
Static task
static1
Behavioral task
behavioral1
Sample
c1c88ea92eb85aebebaecc4400b17298_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
c1c88ea92eb85aebebaecc4400b17298_JaffaCakes118.dll
-
Size
1.6MB
-
MD5
c1c88ea92eb85aebebaecc4400b17298
-
SHA1
0abc7b546451c8d1616fb5656d7375dc8660a296
-
SHA256
89f87a9e574260c5e2d89dd0d880fb873317d71c62c97b91b3f9c6797ecd49ae
-
SHA512
87a6e7f7a761a09947e4b9cbafb08196c264e8e01b1e13050405d56678c9fac84f51f09141a10e0ddec430d8891579e56c3fd93bc40969209ab399cd115f6bdb
-
SSDEEP
24576:kpEQy1JpHqBJOuGHtDqlL7FgbpBGMb51A3Cf9X/QvrFgtQ:km7YB8uGNul9gbDGMbASf5YetQ
Malware Config
Extracted
danabot
11
34.125.56.40:443
35.237.192.132:443
138.68.78.110:443
-
embedded_hash
37E0DF5EB8277A5EEFCF002901483F81
-
type
loader
Signatures
-
Danabot Loader Component 17 IoCs
resource yara_rule behavioral2/memory/4924-2-0x0000000010000000-0x0000000010206000-memory.dmp DanabotLoader2021 behavioral2/memory/4924-3-0x0000000010000000-0x0000000010206000-memory.dmp DanabotLoader2021 behavioral2/memory/4924-5-0x0000000010000000-0x0000000010206000-memory.dmp DanabotLoader2021 behavioral2/memory/4924-6-0x0000000010000000-0x0000000010206000-memory.dmp DanabotLoader2021 behavioral2/memory/4924-7-0x0000000010000000-0x0000000010206000-memory.dmp DanabotLoader2021 behavioral2/memory/4924-8-0x0000000010000000-0x0000000010206000-memory.dmp DanabotLoader2021 behavioral2/memory/4924-9-0x0000000010000000-0x0000000010206000-memory.dmp DanabotLoader2021 behavioral2/memory/4924-10-0x0000000010000000-0x0000000010206000-memory.dmp DanabotLoader2021 behavioral2/memory/4924-11-0x0000000010000000-0x0000000010206000-memory.dmp DanabotLoader2021 behavioral2/memory/4924-12-0x0000000010000000-0x0000000010206000-memory.dmp DanabotLoader2021 behavioral2/memory/4924-13-0x0000000010000000-0x0000000010206000-memory.dmp DanabotLoader2021 behavioral2/memory/4924-14-0x0000000010000000-0x0000000010206000-memory.dmp DanabotLoader2021 behavioral2/memory/4924-15-0x0000000010000000-0x0000000010206000-memory.dmp DanabotLoader2021 behavioral2/memory/4924-16-0x0000000010000000-0x0000000010206000-memory.dmp DanabotLoader2021 behavioral2/memory/4924-17-0x0000000010000000-0x0000000010206000-memory.dmp DanabotLoader2021 behavioral2/memory/4924-18-0x0000000010000000-0x0000000010206000-memory.dmp DanabotLoader2021 behavioral2/memory/4924-19-0x0000000010000000-0x0000000010206000-memory.dmp DanabotLoader2021 -
Danabot family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5044 wrote to memory of 4924 5044 regsvr32.exe 82 PID 5044 wrote to memory of 4924 5044 regsvr32.exe 82 PID 5044 wrote to memory of 4924 5044 regsvr32.exe 82
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\c1c88ea92eb85aebebaecc4400b17298_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\c1c88ea92eb85aebebaecc4400b17298_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:4924
-