Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 21:15
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5e056d6acc82cf88bd815a6d5bfd9e68e1fc39b40be527bd49f98a35603e78dc.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_5e056d6acc82cf88bd815a6d5bfd9e68e1fc39b40be527bd49f98a35603e78dc.exe
-
Size
2.3MB
-
MD5
eff406e8d2e15ea1584522b8a45318d4
-
SHA1
2dd62d8816da6ce0f0f162e7b7512dfcf942af50
-
SHA256
5e056d6acc82cf88bd815a6d5bfd9e68e1fc39b40be527bd49f98a35603e78dc
-
SHA512
b3cc0b141d0ce23ef0772d1fdb3f15d33a827eddb797ac36d03d9762b2bdea31f44d5d013e181673769492cca7b05383554ebc52a4e8b5dca3158712094717df
-
SSDEEP
49152:JPLINXLva+kNJ3I2F5PwPVdEJaOk0AUMVRrmKLoa/cmKQ:J8NXLva+CFmPQUZ0/M3rmUoa
Malware Config
Extracted
danabot
153.92.223.225:443
185.62.56.245:443
198.15.112.179:443
-
embedded_hash
5B850BFD39D47030C0AAC0024D43ABEA
-
type
loader
Signatures
-
Danabot family
-
Blocklisted process makes network request 10 IoCs
flow pid Process 13 2316 rundll32.exe 16 2316 rundll32.exe 34 2316 rundll32.exe 36 2316 rundll32.exe 40 2316 rundll32.exe 41 2316 rundll32.exe 46 2316 rundll32.exe 47 2316 rundll32.exe 48 2316 rundll32.exe 49 2316 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 2316 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4140 1360 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5e056d6acc82cf88bd815a6d5bfd9e68e1fc39b40be527bd49f98a35603e78dc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1360 wrote to memory of 2316 1360 JaffaCakes118_5e056d6acc82cf88bd815a6d5bfd9e68e1fc39b40be527bd49f98a35603e78dc.exe 83 PID 1360 wrote to memory of 2316 1360 JaffaCakes118_5e056d6acc82cf88bd815a6d5bfd9e68e1fc39b40be527bd49f98a35603e78dc.exe 83 PID 1360 wrote to memory of 2316 1360 JaffaCakes118_5e056d6acc82cf88bd815a6d5bfd9e68e1fc39b40be527bd49f98a35603e78dc.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5e056d6acc82cf88bd815a6d5bfd9e68e1fc39b40be527bd49f98a35603e78dc.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5e056d6acc82cf88bd815a6d5bfd9e68e1fc39b40be527bd49f98a35603e78dc.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Oaafhiiwwshq.dll,start C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1360 -s 5402⤵
- Program crash
PID:4140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1360 -ip 13601⤵PID:4980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD5e6ab4dc8882f243c7580fce808e0ac0a
SHA1f66bfc4202a8437db37aec4e129e27a057b42bcf
SHA256767917a8380adcd79c5b4cacef27fabb2f407717dcd34271c635efb9628bdb18
SHA5123f4c9e7f9401fd1f04c333d115f1973e9771b521c2d1bc294a405ea4a32617d6f0320b913eb4f98b248a09d7367057cc9785b37736ad414d826d1454055f7bdb