Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-06-2024 22:59
Behavioral task
behavioral1
Sample
04470f9ceb896de913e7cf45b915e60b_JaffaCakes118.dll
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
04470f9ceb896de913e7cf45b915e60b_JaffaCakes118.dll
-
Size
1.3MB
-
MD5
04470f9ceb896de913e7cf45b915e60b
-
SHA1
e8c1b223877d5fc5ceb367ae00f8bb711bf985c4
-
SHA256
5d8ef088237e6e07d8a17be5a1eaa407f631256db6fdfc9ca2e7e9f1270d79ac
-
SHA512
34f26ab8a3942e4155ec2caad56aba1fbef458364ec3d78b50f74c2ba5434418ad62ade11294f575777cf982c7adc4fa14c8be6b853fa9d3de5a18ade9ae2b9b
-
SSDEEP
24576:y8FGQxgeq6Cd6oe0cxI9va8g8uU9hs1JOUEBVTcKIW9wF0:Z8g8NYUT9IW9wF
Malware Config
Extracted
Family
danabot
Botnet
4
C2
23.229.29.48:443
5.9.224.204:443
192.210.222.81:443
Attributes
-
embedded_hash
0E1A7A1479C37094441FA911262B322A
-
type
loader
rsa_pubkey.plain
rsa_privkey.plain
Signatures
-
Danabot Loader Component 15 IoCs
Processes:
resource yara_rule behavioral1/memory/2340-0-0x0000000000900000-0x0000000000A60000-memory.dmp DanabotLoader2021 behavioral1/memory/2340-1-0x0000000000900000-0x0000000000A60000-memory.dmp DanabotLoader2021 behavioral1/memory/2340-2-0x0000000000900000-0x0000000000A60000-memory.dmp DanabotLoader2021 behavioral1/memory/2340-3-0x0000000000900000-0x0000000000A60000-memory.dmp DanabotLoader2021 behavioral1/memory/2340-4-0x0000000000900000-0x0000000000A60000-memory.dmp DanabotLoader2021 behavioral1/memory/2340-5-0x0000000000900000-0x0000000000A60000-memory.dmp DanabotLoader2021 behavioral1/memory/2340-6-0x0000000000900000-0x0000000000A60000-memory.dmp DanabotLoader2021 behavioral1/memory/2340-7-0x0000000000900000-0x0000000000A60000-memory.dmp DanabotLoader2021 behavioral1/memory/2340-8-0x0000000000900000-0x0000000000A60000-memory.dmp DanabotLoader2021 behavioral1/memory/2340-9-0x0000000000900000-0x0000000000A60000-memory.dmp DanabotLoader2021 behavioral1/memory/2340-10-0x0000000000900000-0x0000000000A60000-memory.dmp DanabotLoader2021 behavioral1/memory/2340-11-0x0000000000900000-0x0000000000A60000-memory.dmp DanabotLoader2021 behavioral1/memory/2340-12-0x0000000000900000-0x0000000000A60000-memory.dmp DanabotLoader2021 behavioral1/memory/2340-13-0x0000000000900000-0x0000000000A60000-memory.dmp DanabotLoader2021 behavioral1/memory/2340-14-0x0000000000900000-0x0000000000A60000-memory.dmp DanabotLoader2021 -
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 2 2340 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1420 wrote to memory of 2340 1420 rundll32.exe rundll32.exe PID 1420 wrote to memory of 2340 1420 rundll32.exe rundll32.exe PID 1420 wrote to memory of 2340 1420 rundll32.exe rundll32.exe PID 1420 wrote to memory of 2340 1420 rundll32.exe rundll32.exe PID 1420 wrote to memory of 2340 1420 rundll32.exe rundll32.exe PID 1420 wrote to memory of 2340 1420 rundll32.exe rundll32.exe PID 1420 wrote to memory of 2340 1420 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\04470f9ceb896de913e7cf45b915e60b_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\04470f9ceb896de913e7cf45b915e60b_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2340-0-0x0000000000900000-0x0000000000A60000-memory.dmpFilesize
1.4MB
-
memory/2340-1-0x0000000000900000-0x0000000000A60000-memory.dmpFilesize
1.4MB
-
memory/2340-2-0x0000000000900000-0x0000000000A60000-memory.dmpFilesize
1.4MB
-
memory/2340-3-0x0000000000900000-0x0000000000A60000-memory.dmpFilesize
1.4MB
-
memory/2340-4-0x0000000000900000-0x0000000000A60000-memory.dmpFilesize
1.4MB
-
memory/2340-5-0x0000000000900000-0x0000000000A60000-memory.dmpFilesize
1.4MB
-
memory/2340-6-0x0000000000900000-0x0000000000A60000-memory.dmpFilesize
1.4MB
-
memory/2340-7-0x0000000000900000-0x0000000000A60000-memory.dmpFilesize
1.4MB
-
memory/2340-8-0x0000000000900000-0x0000000000A60000-memory.dmpFilesize
1.4MB
-
memory/2340-9-0x0000000000900000-0x0000000000A60000-memory.dmpFilesize
1.4MB
-
memory/2340-10-0x0000000000900000-0x0000000000A60000-memory.dmpFilesize
1.4MB
-
memory/2340-11-0x0000000000900000-0x0000000000A60000-memory.dmpFilesize
1.4MB
-
memory/2340-12-0x0000000000900000-0x0000000000A60000-memory.dmpFilesize
1.4MB
-
memory/2340-13-0x0000000000900000-0x0000000000A60000-memory.dmpFilesize
1.4MB
-
memory/2340-14-0x0000000000900000-0x0000000000A60000-memory.dmpFilesize
1.4MB