Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
19-05-2024 09:28
Static task
static1
Behavioral task
behavioral1
Sample
59b3c322d96ea9484bba43e7271b8a07_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
59b3c322d96ea9484bba43e7271b8a07_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
59b3c322d96ea9484bba43e7271b8a07_JaffaCakes118.exe
-
Size
176KB
-
MD5
59b3c322d96ea9484bba43e7271b8a07
-
SHA1
7c701e74728bd495d8b3ee4c2c478b76c4c93349
-
SHA256
7a1f440b6b21b1ddd98c2c6eb495910ad91d8097114348fbb24bb323676cb383
-
SHA512
be6842e5ed751f6eb7a22ef9247d23bddd5594aebc45ea2f3bfd744060c684d391afbfdc3ef26c58452e5a2ccd0baa2ab16ecd044568c635a578821d206a1e98
-
SSDEEP
3072:aPKgZsYU009yEesYZfIeIXn8DBNiAHRDmm5mNWg8e6:lgZsYU009yEW7o8DOAHRDmm5msgS
Malware Config
Extracted
icedid
1163895564
aginia.net
aginia.top
aginia.in
aginia.tel
telected.com
telected.xyz
-
auth_var
4
-
url_path
/index.php
Signatures
-
IcedID Second Stage Loader 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2420-18-0x0000000000280000-0x0000000000285000-memory.dmp IcedidSecondLoader -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
59b3c322d96ea9484bba43e7271b8a07_JaffaCakes118.exepid process 2420 59b3c322d96ea9484bba43e7271b8a07_JaffaCakes118.exe 2420 59b3c322d96ea9484bba43e7271b8a07_JaffaCakes118.exe