Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2024 08:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
00f2c684e59164d887e54cbeec99b92a_JaffaCakes118.dll
Resource
win7-20240215-en
3 signatures
150 seconds
General
-
Target
00f2c684e59164d887e54cbeec99b92a_JaffaCakes118.dll
-
Size
80KB
-
MD5
00f2c684e59164d887e54cbeec99b92a
-
SHA1
f2c84cfb2e5bc4612c2ad9fb250c81550361b1c6
-
SHA256
dbf032427e488cb9456c410f1bfdf3c47b8ad496fd18db34cf1c1d6573a966e6
-
SHA512
2020cf46734a1a4d11533a09744bd9692854463b072f46e423909d73c4f4aa11f5c2498f65ff970b1d0539c17deb87c88cc9fb6c81eee0b2c9feed15affbe196
-
SSDEEP
768:pWadwr+b2aikC6DwLUslDgXBpH/zuVQX9pzvjU4YqsABzktk42mWhlzS8q:75ikC6DwLUHfzDX9JU4YK83Az9
Malware Config
Extracted
Family
icedid
Campaign
358151332
C2
azorropulseee.fun
Signatures
-
IcedID First Stage Loader 2 IoCs
resource yara_rule behavioral2/memory/4072-0-0x0000000002580000-0x0000000002587000-memory.dmp IcedidFirstLoader behavioral2/memory/4072-1-0x0000000002580000-0x0000000002587000-memory.dmp IcedidFirstLoader -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4072 regsvr32.exe 4072 regsvr32.exe