Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 21:22
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2e8691f7ff5bad0085f774087ebac60d90d17b2bf50324e9311f1a3d6ed0dcb6.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_2e8691f7ff5bad0085f774087ebac60d90d17b2bf50324e9311f1a3d6ed0dcb6.exe
-
Size
1.9MB
-
MD5
62347da244f5978d9583288fc583f70d
-
SHA1
7b7f348debfd450f2c0f886bd97ade665b932441
-
SHA256
2e8691f7ff5bad0085f774087ebac60d90d17b2bf50324e9311f1a3d6ed0dcb6
-
SHA512
db05ac3a3b08ddf25d6d0bc9b28e97d829a6251253c3a430d82d97a12255549bccaf6c1602d4729afc53dbe01cd982ba20216931511740e32d489434adcd0e10
-
SSDEEP
49152:RUZA7Y3nP7boLvLjHLnUARB+bULaGGqh4BUywgNp8ScpJT:R6tP7wjDLbwB5qh4Fwgb8S0h
Malware Config
Extracted
danabot
103.144.139.228:443
213.227.154.98:443
66.85.147.23:443
153.92.223.225:443
-
embedded_hash
A64A3A6ED13022027B84C77D31BE0C74
-
type
loader
Signatures
-
Danabot family
-
Blocklisted process makes network request 11 IoCs
flow pid Process 13 2372 rundll32.exe 14 2372 rundll32.exe 18 2372 rundll32.exe 35 2372 rundll32.exe 37 2372 rundll32.exe 40 2372 rundll32.exe 41 2372 rundll32.exe 48 2372 rundll32.exe 49 2372 rundll32.exe 50 2372 rundll32.exe 51 2372 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 2372 rundll32.exe 2372 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3848 4164 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_2e8691f7ff5bad0085f774087ebac60d90d17b2bf50324e9311f1a3d6ed0dcb6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4164 wrote to memory of 2372 4164 JaffaCakes118_2e8691f7ff5bad0085f774087ebac60d90d17b2bf50324e9311f1a3d6ed0dcb6.exe 82 PID 4164 wrote to memory of 2372 4164 JaffaCakes118_2e8691f7ff5bad0085f774087ebac60d90d17b2bf50324e9311f1a3d6ed0dcb6.exe 82 PID 4164 wrote to memory of 2372 4164 JaffaCakes118_2e8691f7ff5bad0085f774087ebac60d90d17b2bf50324e9311f1a3d6ed0dcb6.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2e8691f7ff5bad0085f774087ebac60d90d17b2bf50324e9311f1a3d6ed0dcb6.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2e8691f7ff5bad0085f774087ebac60d90d17b2bf50324e9311f1a3d6ed0dcb6.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Etfrehti.dll,start C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 5082⤵
- Program crash
PID:3848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4164 -ip 41641⤵PID:1176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5d7a66ca4622307cefbaf2d548edf21c1
SHA1d6e7396cf81fddc86bd9a6adb17dbec09fbd532d
SHA256c692330b06a1c232eafe7e68f867c6f339ca9545834010b0997e19f936ad0b5d
SHA5124d9e5fa064ea98af43d5fef363a69a593fdd0ae5f4b79db0794bd5b12e9ffd0c52bb53b7c7b08141f4a33ea7b786f2164504af3295ee9466477270e69b87f41c