Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-01-2025 09:14
Behavioral task
behavioral1
Sample
JaffaCakes118_4f6d0da61edc5ba89da41deb61284801.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_4f6d0da61edc5ba89da41deb61284801.dll
-
Size
1.3MB
-
MD5
4f6d0da61edc5ba89da41deb61284801
-
SHA1
1243ac682781578c5f2701a46096a66a61b77ea1
-
SHA256
c6d1571964640aa5794eb80d070a38cfc18d010213cc16e0dadfade8e1b0aa65
-
SHA512
558467db3a68ee56b8952b8eb74229d2675b97f54a4ea674509dec7ae8b7cbc45ef678b19dc34096cc8c43e4743927955076400a82d60d5edecc1f50da50f9fd
-
SSDEEP
24576:z8pWEmCxRJvbip/sVJ5u5+JAMh9sweYgoGZH4vQNTIZMb77Qz:YfNJAMh9ynh4vQNTkn
Malware Config
Extracted
danabot
4
192.119.110.73:443
192.236.147.159:443
192.210.222.88:443
-
embedded_hash
F4711E27D559B4AEB1A081A1EB0AC465
-
type
loader
Signatures
-
Danabot Loader Component 15 IoCs
resource yara_rule behavioral1/memory/2620-0-0x0000000000A20000-0x0000000000B82000-memory.dmp DanabotLoader2021 behavioral1/memory/2620-1-0x0000000000A20000-0x0000000000B82000-memory.dmp DanabotLoader2021 behavioral1/memory/2620-2-0x0000000000A20000-0x0000000000B82000-memory.dmp DanabotLoader2021 behavioral1/memory/2620-3-0x0000000000A20000-0x0000000000B82000-memory.dmp DanabotLoader2021 behavioral1/memory/2620-4-0x0000000000A20000-0x0000000000B82000-memory.dmp DanabotLoader2021 behavioral1/memory/2620-5-0x0000000000A20000-0x0000000000B82000-memory.dmp DanabotLoader2021 behavioral1/memory/2620-6-0x0000000000A20000-0x0000000000B82000-memory.dmp DanabotLoader2021 behavioral1/memory/2620-7-0x0000000000A20000-0x0000000000B82000-memory.dmp DanabotLoader2021 behavioral1/memory/2620-8-0x0000000000A20000-0x0000000000B82000-memory.dmp DanabotLoader2021 behavioral1/memory/2620-9-0x0000000000A20000-0x0000000000B82000-memory.dmp DanabotLoader2021 behavioral1/memory/2620-10-0x0000000000A20000-0x0000000000B82000-memory.dmp DanabotLoader2021 behavioral1/memory/2620-11-0x0000000000A20000-0x0000000000B82000-memory.dmp DanabotLoader2021 behavioral1/memory/2620-12-0x0000000000A20000-0x0000000000B82000-memory.dmp DanabotLoader2021 behavioral1/memory/2620-13-0x0000000000A20000-0x0000000000B82000-memory.dmp DanabotLoader2021 behavioral1/memory/2620-14-0x0000000000A20000-0x0000000000B82000-memory.dmp DanabotLoader2021 -
Danabot family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 2 2620 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3060 wrote to memory of 2620 3060 rundll32.exe 31 PID 3060 wrote to memory of 2620 3060 rundll32.exe 31 PID 3060 wrote to memory of 2620 3060 rundll32.exe 31 PID 3060 wrote to memory of 2620 3060 rundll32.exe 31 PID 3060 wrote to memory of 2620 3060 rundll32.exe 31 PID 3060 wrote to memory of 2620 3060 rundll32.exe 31 PID 3060 wrote to memory of 2620 3060 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4f6d0da61edc5ba89da41deb61284801.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4f6d0da61edc5ba89da41deb61284801.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2620
-