Analysis
-
max time kernel
140s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2025 14:44
Behavioral task
behavioral1
Sample
JaffaCakes118_296d00b7a72f05ae2ca4e6fdf54ddaf7.dll
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_296d00b7a72f05ae2ca4e6fdf54ddaf7.dll
-
Size
1.3MB
-
MD5
296d00b7a72f05ae2ca4e6fdf54ddaf7
-
SHA1
878b3e03cbc01f3ecaaa6e7631c5ca95f5de2c8e
-
SHA256
26e754abd0b5fb5aad42b13475186c4b53b9f26ef00371c2a7e8e581e8428cc2
-
SHA512
845395d1da847754326d8b1a34ef5a8c6dbf5ace2ecef30de4edd65ee4f636620d31b840575deca2caa15acd68021d361e7218e8a2c91b87b56c15ea58414eb3
-
SSDEEP
24576:GncFdh7rbCc1XupdscfiyWOrLYgt4LCporTJgag:lhe6xOTyPrT
Malware Config
Extracted
danabot
4
192.119.110.73:443
192.236.147.159:443
192.210.222.88:443
-
embedded_hash
F4711E27D559B4AEB1A081A1EB0AC465
-
type
loader
Signatures
-
Danabot Loader Component 14 IoCs
resource yara_rule behavioral2/memory/2832-0-0x0000000000400000-0x0000000000563000-memory.dmp DanabotLoader2021 behavioral2/memory/2832-1-0x0000000000400000-0x0000000000563000-memory.dmp DanabotLoader2021 behavioral2/memory/2832-2-0x0000000000400000-0x0000000000563000-memory.dmp DanabotLoader2021 behavioral2/memory/2832-3-0x0000000000400000-0x0000000000563000-memory.dmp DanabotLoader2021 behavioral2/memory/2832-4-0x0000000000400000-0x0000000000563000-memory.dmp DanabotLoader2021 behavioral2/memory/2832-5-0x0000000000400000-0x0000000000563000-memory.dmp DanabotLoader2021 behavioral2/memory/2832-6-0x0000000000400000-0x0000000000563000-memory.dmp DanabotLoader2021 behavioral2/memory/2832-7-0x0000000000400000-0x0000000000563000-memory.dmp DanabotLoader2021 behavioral2/memory/2832-8-0x0000000000400000-0x0000000000563000-memory.dmp DanabotLoader2021 behavioral2/memory/2832-9-0x0000000000400000-0x0000000000563000-memory.dmp DanabotLoader2021 behavioral2/memory/2832-10-0x0000000000400000-0x0000000000563000-memory.dmp DanabotLoader2021 behavioral2/memory/2832-11-0x0000000000400000-0x0000000000563000-memory.dmp DanabotLoader2021 behavioral2/memory/2832-12-0x0000000000400000-0x0000000000563000-memory.dmp DanabotLoader2021 behavioral2/memory/2832-13-0x0000000000400000-0x0000000000563000-memory.dmp DanabotLoader2021 -
Danabot family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 1 2832 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1296 wrote to memory of 2832 1296 rundll32.exe 82 PID 1296 wrote to memory of 2832 1296 rundll32.exe 82 PID 1296 wrote to memory of 2832 1296 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_296d00b7a72f05ae2ca4e6fdf54ddaf7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_296d00b7a72f05ae2ca4e6fdf54ddaf7.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2832
-