Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-05-2024 02:43
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
582ad51b14aec27c377e94075c8f7acb_JaffaCakes118.dll
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
582ad51b14aec27c377e94075c8f7acb_JaffaCakes118.dll
-
Size
406KB
-
MD5
582ad51b14aec27c377e94075c8f7acb
-
SHA1
821f9c75558339044a1491db3165d5445b0a3f06
-
SHA256
2de6bde148b9a42a65f5dae36c903811e56d702d7d319900877f2d5d74273236
-
SHA512
a25fa0130b6a78deeaa3941a513a3da8aaa60d2439f1224274d8d7f290bf7cd4463c63678e8270ad8e89c70a7927302d9da427df51dcf5fb970d195c947c2fad
-
SSDEEP
6144:MU/OLpMfqR6vtVIgyPFiChgkX7WOMeLpebnZgUe4A29pNwz:MU/OLCftLqPACIeoFa4A29Dwz
Malware Config
Extracted
Family
icedid
C2
ldrruble.casa
Signatures
-
IcedID First Stage Loader 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2060-1-0x0000000075040000-0x00000000750FF000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 30 IoCs
Processes:
rundll32.exeflow pid process 3 2060 rundll32.exe 4 2060 rundll32.exe 6 2060 rundll32.exe 7 2060 rundll32.exe 9 2060 rundll32.exe 10 2060 rundll32.exe 14 2060 rundll32.exe 15 2060 rundll32.exe 17 2060 rundll32.exe 18 2060 rundll32.exe 20 2060 rundll32.exe 21 2060 rundll32.exe 22 2060 rundll32.exe 23 2060 rundll32.exe 25 2060 rundll32.exe 26 2060 rundll32.exe 28 2060 rundll32.exe 29 2060 rundll32.exe 31 2060 rundll32.exe 32 2060 rundll32.exe 34 2060 rundll32.exe 35 2060 rundll32.exe 36 2060 rundll32.exe 37 2060 rundll32.exe 39 2060 rundll32.exe 40 2060 rundll32.exe 42 2060 rundll32.exe 43 2060 rundll32.exe 45 2060 rundll32.exe 46 2060 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2476 wrote to memory of 2060 2476 rundll32.exe rundll32.exe PID 2476 wrote to memory of 2060 2476 rundll32.exe rundll32.exe PID 2476 wrote to memory of 2060 2476 rundll32.exe rundll32.exe PID 2476 wrote to memory of 2060 2476 rundll32.exe rundll32.exe PID 2476 wrote to memory of 2060 2476 rundll32.exe rundll32.exe PID 2476 wrote to memory of 2060 2476 rundll32.exe rundll32.exe PID 2476 wrote to memory of 2060 2476 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\582ad51b14aec27c377e94075c8f7acb_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\582ad51b14aec27c377e94075c8f7acb_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
PID:2060
-