Analysis
-
max time kernel
145s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
18-05-2024 20:38
Static task
static1
Behavioral task
behavioral1
Sample
56abafa43027c3abd0513dbc41f1a84d_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
56abafa43027c3abd0513dbc41f1a84d_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
56abafa43027c3abd0513dbc41f1a84d_JaffaCakes118.exe
-
Size
52KB
-
MD5
56abafa43027c3abd0513dbc41f1a84d
-
SHA1
1b023618921b0eab208060b41cfdf52b7b7796ca
-
SHA256
badf5b6c2231f8b56f60d0e71cdadf4c0938626d39230776a6d5adb1f4c352f1
-
SHA512
93bcbbc4c92bb0466a53dea28cded80d7c11492d8fa9c12c4de53c0b1f5363a2cb94d60218ea37e876f6cca1c4ac6c6ce4365f4af8757eeeab21367470b81b7e
-
SSDEEP
768:cmuCT9rI4m5reZEddakwOMMkxv92w3QylggXv06DkzExr7j6ZmDWDHkQ37w:yCegudIGMMY9TDlgg/0QcHtDHk
Malware Config
Extracted
icedid
Extracted
icedid
2118099802
allpikoloserdzwe.cyou
sipmptomsledy.top
-
auth_var
1
-
url_path
/audio/
Signatures
-
IcedID Second Stage Loader 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2908-9-0x0000000000460000-0x0000000000465000-memory.dmp IcedidSecondLoader behavioral1/memory/2908-4-0x0000000001D10000-0x0000000001D16000-memory.dmp IcedidSecondLoader behavioral1/memory/2908-0-0x0000000000470000-0x0000000000478000-memory.dmp IcedidSecondLoader -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
56abafa43027c3abd0513dbc41f1a84d_JaffaCakes118.exepid process 2908 56abafa43027c3abd0513dbc41f1a84d_JaffaCakes118.exe 2908 56abafa43027c3abd0513dbc41f1a84d_JaffaCakes118.exe