Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 06:45
Behavioral task
behavioral1
Sample
JaffaCakes118_f9e0642b0e36d83c2c58953619e6f4c5.dll
Resource
win7-20241023-en
General
-
Target
JaffaCakes118_f9e0642b0e36d83c2c58953619e6f4c5.dll
-
Size
1.3MB
-
MD5
f9e0642b0e36d83c2c58953619e6f4c5
-
SHA1
b00c21cc5e56f77472313ea1017d0db97f1e5c86
-
SHA256
7e93386b0f4aee6ba5dba9b29ebbf2926c99a83ff57e4f7719d652e2b0ba301f
-
SHA512
25675403947478631855fb9008f1f9234843f3bdfaab816570dfe10549d22651a2b0a1c408ff6094db062cf3272bdf0cd6d14ff91099fc36bf9bab708001c104
-
SSDEEP
24576:1ncFd4/jGahKXNsix1g9zbu8e/3FiE+TCzgcAw:SEs+buX7+TNZ
Malware Config
Extracted
danabot
4
142.11.192.232:443
192.119.110.73:443
142.11.242.31:443
192.210.222.88:443
-
embedded_hash
F4711E27D559B4AEB1A081A1EB0AC465
-
type
loader
Signatures
-
Danabot family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 1 4284 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4552 wrote to memory of 4284 4552 rundll32.exe 83 PID 4552 wrote to memory of 4284 4552 rundll32.exe 83 PID 4552 wrote to memory of 4284 4552 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f9e0642b0e36d83c2c58953619e6f4c5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f9e0642b0e36d83c2c58953619e6f4c5.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:4284
-