Analysis
-
max time kernel
141s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08-01-2025 09:11
Behavioral task
behavioral1
Sample
JaffaCakes118_97a3668179419efba15310b631ee7524.dll
Resource
win7-20240708-en
General
-
Target
JaffaCakes118_97a3668179419efba15310b631ee7524.dll
-
Size
1.3MB
-
MD5
97a3668179419efba15310b631ee7524
-
SHA1
d1f06f55ba68b1462e2136e2eb2fdde5f3361731
-
SHA256
3984663ff227a326f173b572f63df7325aa3af71969b2388704cdd312092a2a1
-
SHA512
38db9aecd6a019926f817100d87812c8bd1aed7a8ed2f20cfc145a081cd97785593e4c3a2bc8ae8693d27225924217ef3de1be1a15712f6cbb130d694e14beb8
-
SSDEEP
24576:SncFd3rbXjVs2RPPwVt6TnJNKd8MXuu4+xdhfTf0gWHR:5ZsCNKdBXJNfTsgwR
Malware Config
Extracted
danabot
4
192.119.110.73:443
192.236.147.159:443
192.210.222.88:443
-
embedded_hash
F4711E27D559B4AEB1A081A1EB0AC465
-
type
loader
Signatures
-
Danabot family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 2 2016 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2016 2380 rundll32.exe 30 PID 2380 wrote to memory of 2016 2380 rundll32.exe 30 PID 2380 wrote to memory of 2016 2380 rundll32.exe 30 PID 2380 wrote to memory of 2016 2380 rundll32.exe 30 PID 2380 wrote to memory of 2016 2380 rundll32.exe 30 PID 2380 wrote to memory of 2016 2380 rundll32.exe 30 PID 2380 wrote to memory of 2016 2380 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_97a3668179419efba15310b631ee7524.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_97a3668179419efba15310b631ee7524.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2016
-