Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-04-2024 05:00
Static task
static1
Behavioral task
behavioral1
Sample
e6afaa7501c3c20792878330c38f27e4_JaffaCakes118.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
e6afaa7501c3c20792878330c38f27e4_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
e6afaa7501c3c20792878330c38f27e4_JaffaCakes118.dll
-
Size
161KB
-
MD5
e6afaa7501c3c20792878330c38f27e4
-
SHA1
e2129aa677ee70da27561beeb29f1ceb01f4d1fc
-
SHA256
2416d293b86c725c2960746874c7863fa8b166735f3230d98f50640e5d111a99
-
SHA512
35122279c3f8895b186fefc469d9d232647e962d93027a5a53de260990b3ba15c35c2f822d2af7c060b67e50163ea85e480ee4df73d8954ecbb3f9ed115dec87
-
SSDEEP
1536:CY93h9npJAsRzAZavPK4lknkwidTiHetGnZUgThyQFYIoet+AhWBiuWCvtnqyhG8:rhLJAqzKPkVTiHe8eYnKVmQBcCG
Malware Config
Extracted
icedid
1925120085
zapatiryesa.fun
Signatures
-
IcedID First Stage Loader 1 IoCs
resource yara_rule behavioral2/memory/1420-0-0x0000000000A70000-0x0000000000A77000-memory.dmp IcedidFirstLoader -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1420 regsvr32.exe 1420 regsvr32.exe