Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 14:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2f9f7be08b17f2cdcaabc4c7dae6c9bd_JaffaCakes118.dll
Resource
win7-20231129-en
windows7-x64
4 signatures
150 seconds
General
-
Target
2f9f7be08b17f2cdcaabc4c7dae6c9bd_JaffaCakes118.dll
-
Size
211KB
-
MD5
2f9f7be08b17f2cdcaabc4c7dae6c9bd
-
SHA1
77d0781343f02cf5636f6be94e37b1cd61975275
-
SHA256
55bc7ae7ab1017eb75387291424a67b9655d52e9357005caacbbb997dada592c
-
SHA512
1e2576484a434e93dce8d558f23d25d177453c0c32d0263afbc84c0ce6bc263eb42c0206c06963b67b98e130f725bcbee04a505dd40c781d1b89340cc32ec76b
-
SSDEEP
6144:6ZLwAyyWMa3NIBkL6LDW8dTZdw702edvxiuYOO6umz4:6ZLwAyyHadIBkLIi8dTL2SvguYOO1mk
Malware Config
Extracted
Family
icedid
C2
ldrstar.casa
Signatures
-
IcedID First Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2992-1-0x00000000755D0000-0x000000007565C000-memory.dmp IcedidFirstLoader behavioral2/memory/2992-2-0x00000000755D0000-0x000000007565C000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 15 IoCs
Processes:
rundll32.exeflow pid process 33 2992 rundll32.exe 34 2992 rundll32.exe 37 2992 rundll32.exe 40 2992 rundll32.exe 43 2992 rundll32.exe 51 2992 rundll32.exe 53 2992 rundll32.exe 56 2992 rundll32.exe 58 2992 rundll32.exe 65 2992 rundll32.exe 66 2992 rundll32.exe 68 2992 rundll32.exe 71 2992 rundll32.exe 72 2992 rundll32.exe 74 2992 rundll32.exe -
Program crash 6 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3980 2992 WerFault.exe rundll32.exe 4708 2992 WerFault.exe rundll32.exe 4944 2992 WerFault.exe rundll32.exe 2492 2992 WerFault.exe rundll32.exe 372 2992 WerFault.exe rundll32.exe 4644 2992 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1256 wrote to memory of 2992 1256 rundll32.exe rundll32.exe PID 1256 wrote to memory of 2992 1256 rundll32.exe rundll32.exe PID 1256 wrote to memory of 2992 1256 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f9f7be08b17f2cdcaabc4c7dae6c9bd_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f9f7be08b17f2cdcaabc4c7dae6c9bd_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
PID:2992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2992 -s 6363⤵
- Program crash
PID:3980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2992 -s 8003⤵
- Program crash
PID:4708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2992 -s 8163⤵
- Program crash
PID:4944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2992 -s 12163⤵
- Program crash
PID:2492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2992 -s 11083⤵
- Program crash
PID:372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2992 -s 13923⤵
- Program crash
PID:4644
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2992 -ip 29921⤵PID:4680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2992 -ip 29921⤵PID:992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2992 -ip 29921⤵PID:3640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2992 -ip 29921⤵PID:2332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2992 -ip 29921⤵PID:1608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2992 -ip 29921⤵PID:4988