Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2024, 21:03
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_9eebce8383071dd565ccd67a626cd0809ef9928af7555c610d979cc4d52eaf0f.exe
Resource
win7-20241023-en
General
-
Target
JaffaCakes118_9eebce8383071dd565ccd67a626cd0809ef9928af7555c610d979cc4d52eaf0f.exe
-
Size
2.3MB
-
MD5
881a3bb370849ebfc0381b310a15c12b
-
SHA1
fed883de3633310e643ff878e4576f4ca23c979f
-
SHA256
9eebce8383071dd565ccd67a626cd0809ef9928af7555c610d979cc4d52eaf0f
-
SHA512
52772a4e5a1b0b6e838aa79f45fd1c62f0ae78807e033ee448b17fdc3bf639526ddda066363e362455da1eb2e9aa117ce55db58ca7f6ed7003f0997ff4b9bd54
-
SSDEEP
49152:HBunMOW4JRYIgw9u6KqjsX/rjhiDJVxD1E2HgCcz45PZy+dbQm:hunMO5YInurqjsHgVxSZz45PZyhm
Malware Config
Extracted
danabot
153.92.223.225:443
185.62.56.245:443
198.15.112.179:443
-
embedded_hash
5B850BFD39D47030C0AAC0024D43ABEA
-
type
loader
Signatures
-
Danabot family
-
Blocklisted process makes network request 9 IoCs
flow pid Process 14 1080 rundll32.exe 22 1080 rundll32.exe 36 1080 rundll32.exe 38 1080 rundll32.exe 42 1080 rundll32.exe 43 1080 rundll32.exe 48 1080 rundll32.exe 49 1080 rundll32.exe 50 1080 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 1080 rundll32.exe 1080 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3140 4656 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_9eebce8383071dd565ccd67a626cd0809ef9928af7555c610d979cc4d52eaf0f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4656 wrote to memory of 1080 4656 JaffaCakes118_9eebce8383071dd565ccd67a626cd0809ef9928af7555c610d979cc4d52eaf0f.exe 84 PID 4656 wrote to memory of 1080 4656 JaffaCakes118_9eebce8383071dd565ccd67a626cd0809ef9928af7555c610d979cc4d52eaf0f.exe 84 PID 4656 wrote to memory of 1080 4656 JaffaCakes118_9eebce8383071dd565ccd67a626cd0809ef9928af7555c610d979cc4d52eaf0f.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9eebce8383071dd565ccd67a626cd0809ef9928af7555c610d979cc4d52eaf0f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9eebce8383071dd565ccd67a626cd0809ef9928af7555c610d979cc4d52eaf0f.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Oaafhiiwwshq.dll,start C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 5162⤵
- Program crash
PID:3140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4656 -ip 46561⤵PID:3628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD5e6ab4dc8882f243c7580fce808e0ac0a
SHA1f66bfc4202a8437db37aec4e129e27a057b42bcf
SHA256767917a8380adcd79c5b4cacef27fabb2f407717dcd34271c635efb9628bdb18
SHA5123f4c9e7f9401fd1f04c333d115f1973e9771b521c2d1bc294a405ea4a32617d6f0320b913eb4f98b248a09d7367057cc9785b37736ad414d826d1454055f7bdb