Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 14:12
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_155b69d0734426dc804a8596d9f3e45da629f6e2fd040c177235547dc1b9db62.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_155b69d0734426dc804a8596d9f3e45da629f6e2fd040c177235547dc1b9db62.exe
-
Size
2.3MB
-
MD5
dfb0e0592d6c8dc938af4995ccb4a37b
-
SHA1
76fa2a835feae7216337aafb0424121441bb0fd2
-
SHA256
155b69d0734426dc804a8596d9f3e45da629f6e2fd040c177235547dc1b9db62
-
SHA512
d6947255c21347c34933e7b988a214ef00879d642cbea1396e6d0f772d4744e4a45e0f49d515f84c2cccabedf8e5ebe180d44ce3521f474efc0a3c2a409af6b7
-
SSDEEP
49152:HrPQpGqdb10mMVVrYKIoc6UzA0dchX0f93T0I52e5DI68fjNme4HPqw:UGqd3ic1A0CqQI57I6Oke4v
Malware Config
Extracted
danabot
153.92.223.225:443
185.62.56.245:443
198.15.112.179:443
-
embedded_hash
5B850BFD39D47030C0AAC0024D43ABEA
-
type
loader
Signatures
-
Danabot family
-
Blocklisted process makes network request 9 IoCs
flow pid Process 16 4460 rundll32.exe 23 4460 rundll32.exe 37 4460 rundll32.exe 39 4460 rundll32.exe 42 4460 rundll32.exe 44 4460 rundll32.exe 48 4460 rundll32.exe 49 4460 rundll32.exe 50 4460 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 4460 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2180 4172 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_155b69d0734426dc804a8596d9f3e45da629f6e2fd040c177235547dc1b9db62.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4172 wrote to memory of 4460 4172 JaffaCakes118_155b69d0734426dc804a8596d9f3e45da629f6e2fd040c177235547dc1b9db62.exe 83 PID 4172 wrote to memory of 4460 4172 JaffaCakes118_155b69d0734426dc804a8596d9f3e45da629f6e2fd040c177235547dc1b9db62.exe 83 PID 4172 wrote to memory of 4460 4172 JaffaCakes118_155b69d0734426dc804a8596d9f3e45da629f6e2fd040c177235547dc1b9db62.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_155b69d0734426dc804a8596d9f3e45da629f6e2fd040c177235547dc1b9db62.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_155b69d0734426dc804a8596d9f3e45da629f6e2fd040c177235547dc1b9db62.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Oaafhiiwwshq.dll,start C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4172 -s 5202⤵
- Program crash
PID:2180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4172 -ip 41721⤵PID:3956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD5e6ab4dc8882f243c7580fce808e0ac0a
SHA1f66bfc4202a8437db37aec4e129e27a057b42bcf
SHA256767917a8380adcd79c5b4cacef27fabb2f407717dcd34271c635efb9628bdb18
SHA5123f4c9e7f9401fd1f04c333d115f1973e9771b521c2d1bc294a405ea4a32617d6f0320b913eb4f98b248a09d7367057cc9785b37736ad414d826d1454055f7bdb