Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 23:17
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_69dc7fa6f994a5275e65d718049370402327b2f17f68ccf4950c10a15dc1d2e9.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_69dc7fa6f994a5275e65d718049370402327b2f17f68ccf4950c10a15dc1d2e9.exe
-
Size
2.3MB
-
MD5
87ab41a3eb754ff859a264c7114b9066
-
SHA1
c60a5d955d2f730742341ffa9548fb4d264624d7
-
SHA256
69dc7fa6f994a5275e65d718049370402327b2f17f68ccf4950c10a15dc1d2e9
-
SHA512
3a9ef627ec97085f7c607106f72601076020babd79a6badd33bf1614fad49e017f3bbd2d4b1e66197615330c5c7f839a2987ca55e68d0b805be71ae3eda2f2c2
-
SSDEEP
49152:egLW1DLQjokdvsrJOwDjdHImM6muJtbWWUSBSz5hMtiOc9D7:L+LQcUvsrJVxMqfb5USA5uS
Malware Config
Extracted
danabot
153.92.223.225:443
185.62.56.245:443
198.15.112.179:443
-
embedded_hash
5B850BFD39D47030C0AAC0024D43ABEA
-
type
loader
Signatures
-
Danabot family
-
Blocklisted process makes network request 10 IoCs
flow pid Process 14 3904 rundll32.exe 17 3904 rundll32.exe 31 3904 rundll32.exe 40 3904 rundll32.exe 41 3904 rundll32.exe 44 3904 rundll32.exe 48 3904 rundll32.exe 49 3904 rundll32.exe 50 3904 rundll32.exe 51 3904 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 3904 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3104 1720 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_69dc7fa6f994a5275e65d718049370402327b2f17f68ccf4950c10a15dc1d2e9.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1720 wrote to memory of 3904 1720 JaffaCakes118_69dc7fa6f994a5275e65d718049370402327b2f17f68ccf4950c10a15dc1d2e9.exe 83 PID 1720 wrote to memory of 3904 1720 JaffaCakes118_69dc7fa6f994a5275e65d718049370402327b2f17f68ccf4950c10a15dc1d2e9.exe 83 PID 1720 wrote to memory of 3904 1720 JaffaCakes118_69dc7fa6f994a5275e65d718049370402327b2f17f68ccf4950c10a15dc1d2e9.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69dc7fa6f994a5275e65d718049370402327b2f17f68ccf4950c10a15dc1d2e9.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69dc7fa6f994a5275e65d718049370402327b2f17f68ccf4950c10a15dc1d2e9.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Oaafhiiwwshq.dll,start C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1720 -s 5082⤵
- Program crash
PID:3104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1720 -ip 17201⤵PID:2148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD5e6ab4dc8882f243c7580fce808e0ac0a
SHA1f66bfc4202a8437db37aec4e129e27a057b42bcf
SHA256767917a8380adcd79c5b4cacef27fabb2f407717dcd34271c635efb9628bdb18
SHA5123f4c9e7f9401fd1f04c333d115f1973e9771b521c2d1bc294a405ea4a32617d6f0320b913eb4f98b248a09d7367057cc9785b37736ad414d826d1454055f7bdb