Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 20:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4ce06b6759df2f433c1da9a8100d3c03_JaffaCakes118.dll
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
4ce06b6759df2f433c1da9a8100d3c03_JaffaCakes118.dll
-
Size
214KB
-
MD5
4ce06b6759df2f433c1da9a8100d3c03
-
SHA1
c2468348f90f1dd05962bf93c9ab1833e7bad115
-
SHA256
ea1d92c3d94727066636b93e3cfe85331eb2865e15f86bc20978be99272ddb0d
-
SHA512
9e611a944a8f8eecf7cbbfc70c6e25904095c400db72b1f45e3028a7f187a77d2c785c7b7e25bf8733453bfa01934c3e29eb93ddde09e23ce3da3435a0404e9c
-
SSDEEP
6144:54+U6OuehTIXJnxeecA9ikbl4yB6ETGzM0yT:a+U6O7eh9cA/lV6ETGw0yT
Malware Config
Extracted
Family
icedid
C2
ldrshekel.casa
Signatures
-
IcedID First Stage Loader 1 IoCs
resource yara_rule behavioral1/memory/2028-2-0x0000000074900000-0x0000000074997000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 32 IoCs
flow pid Process 3 2028 rundll32.exe 4 2028 rundll32.exe 6 2028 rundll32.exe 7 2028 rundll32.exe 11 2028 rundll32.exe 12 2028 rundll32.exe 14 2028 rundll32.exe 15 2028 rundll32.exe 17 2028 rundll32.exe 18 2028 rundll32.exe 20 2028 rundll32.exe 21 2028 rundll32.exe 23 2028 rundll32.exe 24 2028 rundll32.exe 25 2028 rundll32.exe 26 2028 rundll32.exe 28 2028 rundll32.exe 29 2028 rundll32.exe 31 2028 rundll32.exe 32 2028 rundll32.exe 34 2028 rundll32.exe 35 2028 rundll32.exe 37 2028 rundll32.exe 38 2028 rundll32.exe 39 2028 rundll32.exe 40 2028 rundll32.exe 42 2028 rundll32.exe 43 2028 rundll32.exe 45 2028 rundll32.exe 46 2028 rundll32.exe 48 2028 rundll32.exe 49 2028 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2028 2080 rundll32.exe 28 PID 2080 wrote to memory of 2028 2080 rundll32.exe 28 PID 2080 wrote to memory of 2028 2080 rundll32.exe 28 PID 2080 wrote to memory of 2028 2080 rundll32.exe 28 PID 2080 wrote to memory of 2028 2080 rundll32.exe 28 PID 2080 wrote to memory of 2028 2080 rundll32.exe 28 PID 2080 wrote to memory of 2028 2080 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4ce06b6759df2f433c1da9a8100d3c03_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4ce06b6759df2f433c1da9a8100d3c03_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
PID:2028
-