Analysis
-
max time kernel
140s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 20:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4ce06b6759df2f433c1da9a8100d3c03_JaffaCakes118.dll
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
4ce06b6759df2f433c1da9a8100d3c03_JaffaCakes118.dll
-
Size
214KB
-
MD5
4ce06b6759df2f433c1da9a8100d3c03
-
SHA1
c2468348f90f1dd05962bf93c9ab1833e7bad115
-
SHA256
ea1d92c3d94727066636b93e3cfe85331eb2865e15f86bc20978be99272ddb0d
-
SHA512
9e611a944a8f8eecf7cbbfc70c6e25904095c400db72b1f45e3028a7f187a77d2c785c7b7e25bf8733453bfa01934c3e29eb93ddde09e23ce3da3435a0404e9c
-
SSDEEP
6144:54+U6OuehTIXJnxeecA9ikbl4yB6ETGzM0yT:a+U6O7eh9cA/lV6ETGw0yT
Malware Config
Extracted
Family
icedid
C2
ldrshekel.casa
Signatures
-
IcedID First Stage Loader 1 IoCs
resource yara_rule behavioral2/memory/4268-1-0x0000000074FA0000-0x0000000075037000-memory.dmp IcedidFirstLoader -
Program crash 1 IoCs
pid pid_target Process procid_target 232 4268 WerFault.exe 83 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3308 wrote to memory of 4268 3308 rundll32.exe 83 PID 3308 wrote to memory of 4268 3308 rundll32.exe 83 PID 3308 wrote to memory of 4268 3308 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4ce06b6759df2f433c1da9a8100d3c03_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4ce06b6759df2f433c1da9a8100d3c03_JaffaCakes118.dll,#12⤵PID:4268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 5963⤵
- Program crash
PID:232
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4268 -ip 42681⤵PID:1556