Analysis
-
max time kernel
141s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
06-01-2025 14:44
Behavioral task
behavioral1
Sample
JaffaCakes118_296d00b7a72f05ae2ca4e6fdf54ddaf7.dll
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_296d00b7a72f05ae2ca4e6fdf54ddaf7.dll
-
Size
1.3MB
-
MD5
296d00b7a72f05ae2ca4e6fdf54ddaf7
-
SHA1
878b3e03cbc01f3ecaaa6e7631c5ca95f5de2c8e
-
SHA256
26e754abd0b5fb5aad42b13475186c4b53b9f26ef00371c2a7e8e581e8428cc2
-
SHA512
845395d1da847754326d8b1a34ef5a8c6dbf5ace2ecef30de4edd65ee4f636620d31b840575deca2caa15acd68021d361e7218e8a2c91b87b56c15ea58414eb3
-
SSDEEP
24576:GncFdh7rbCc1XupdscfiyWOrLYgt4LCporTJgag:lhe6xOTyPrT
Malware Config
Extracted
danabot
4
192.119.110.73:443
192.236.147.159:443
192.210.222.88:443
-
embedded_hash
F4711E27D559B4AEB1A081A1EB0AC465
-
type
loader
Signatures
-
Danabot Loader Component 15 IoCs
resource yara_rule behavioral1/memory/2512-0-0x0000000002360000-0x00000000024C3000-memory.dmp DanabotLoader2021 behavioral1/memory/2512-1-0x0000000002360000-0x00000000024C3000-memory.dmp DanabotLoader2021 behavioral1/memory/2512-2-0x0000000002360000-0x00000000024C3000-memory.dmp DanabotLoader2021 behavioral1/memory/2512-3-0x0000000002360000-0x00000000024C3000-memory.dmp DanabotLoader2021 behavioral1/memory/2512-4-0x0000000002360000-0x00000000024C3000-memory.dmp DanabotLoader2021 behavioral1/memory/2512-5-0x0000000002360000-0x00000000024C3000-memory.dmp DanabotLoader2021 behavioral1/memory/2512-6-0x0000000002360000-0x00000000024C3000-memory.dmp DanabotLoader2021 behavioral1/memory/2512-7-0x0000000002360000-0x00000000024C3000-memory.dmp DanabotLoader2021 behavioral1/memory/2512-8-0x0000000002360000-0x00000000024C3000-memory.dmp DanabotLoader2021 behavioral1/memory/2512-9-0x0000000002360000-0x00000000024C3000-memory.dmp DanabotLoader2021 behavioral1/memory/2512-10-0x0000000002360000-0x00000000024C3000-memory.dmp DanabotLoader2021 behavioral1/memory/2512-11-0x0000000002360000-0x00000000024C3000-memory.dmp DanabotLoader2021 behavioral1/memory/2512-12-0x0000000002360000-0x00000000024C3000-memory.dmp DanabotLoader2021 behavioral1/memory/2512-13-0x0000000002360000-0x00000000024C3000-memory.dmp DanabotLoader2021 behavioral1/memory/2512-14-0x0000000002360000-0x00000000024C3000-memory.dmp DanabotLoader2021 -
Danabot family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 2 2512 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2512 2532 rundll32.exe 29 PID 2532 wrote to memory of 2512 2532 rundll32.exe 29 PID 2532 wrote to memory of 2512 2532 rundll32.exe 29 PID 2532 wrote to memory of 2512 2532 rundll32.exe 29 PID 2532 wrote to memory of 2512 2532 rundll32.exe 29 PID 2532 wrote to memory of 2512 2532 rundll32.exe 29 PID 2532 wrote to memory of 2512 2532 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_296d00b7a72f05ae2ca4e6fdf54ddaf7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_296d00b7a72f05ae2ca4e6fdf54ddaf7.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2512
-