Analysis
-
max time kernel
134s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 21:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7a946bfc8ca85ad16bf66ecabb4ccdec_JaffaCakes118.dll
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
7a946bfc8ca85ad16bf66ecabb4ccdec_JaffaCakes118.dll
-
Size
214KB
-
MD5
7a946bfc8ca85ad16bf66ecabb4ccdec
-
SHA1
0c5014dcdcf28f11f31c13e3fb3ef6ae5559f628
-
SHA256
8efa3aea51c2da764f118b7808fa096c3e3a841b676b1e046cdd6ad50cf8af3d
-
SHA512
f667e6badebdc6a8bc677bb54f073112b70b7896c41b04d40a47880d5ccb47082996fc2e04aeabb55888d92d269a3b1d650bdf190eb25f058560a311cbd326c3
-
SSDEEP
6144:54+U6OuNhTIXJnxeecA9ikbl4yB6ETGzM0yT:a+U6Oseh9cA/lV6ETGw0yT
Malware Config
Extracted
Family
icedid
C2
ldrshekel.casa
Signatures
-
IcedID First Stage Loader 1 IoCs
resource yara_rule behavioral2/memory/1088-1-0x00000000755C0000-0x0000000075657000-memory.dmp IcedidFirstLoader -
Program crash 1 IoCs
pid pid_target Process procid_target 4120 1088 WerFault.exe 83 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 952 wrote to memory of 1088 952 rundll32.exe 83 PID 952 wrote to memory of 1088 952 rundll32.exe 83 PID 952 wrote to memory of 1088 952 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7a946bfc8ca85ad16bf66ecabb4ccdec_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7a946bfc8ca85ad16bf66ecabb4ccdec_JaffaCakes118.dll,#12⤵PID:1088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1088 -s 5963⤵
- Program crash
PID:4120
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 1088 -ip 10881⤵PID:2684