Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 03:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7b8b3de47c3fd708b0bf453fac1ff706_JaffaCakes118.dll
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
7b8b3de47c3fd708b0bf453fac1ff706_JaffaCakes118.dll
-
Size
211KB
-
MD5
7b8b3de47c3fd708b0bf453fac1ff706
-
SHA1
ccf109d735ced74a4e45c6b6fdba0714134d3a69
-
SHA256
6571b88739b154807adbbe7b8d3ff75543887405f066489fb773a2186b862132
-
SHA512
0734d5ef4568a0fee0dd7fa2b932e4fdeaaea9737bf891805b5c09ddce52dad4e1ca01a705d3139db284b655a99283f282f8440eec237aefe16595fdce1f3b1c
-
SSDEEP
6144:6ZLwbyyWMa3NIBkL6LDW8dTZdw702edvxiuYOO6umz4N:6ZLwbyyHadIBkLIi8dTL2SvguYOO1mkN
Malware Config
Extracted
Family
icedid
C2
ldrstar.casa
Signatures
-
IcedID First Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2000-1-0x00000000750E0000-0x000000007516C000-memory.dmp IcedidFirstLoader behavioral2/memory/2000-2-0x00000000750E0000-0x000000007516C000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 12 IoCs
Processes:
rundll32.exeflow pid process 46 2000 rundll32.exe 48 2000 rundll32.exe 50 2000 rundll32.exe 56 2000 rundll32.exe 62 2000 rundll32.exe 68 2000 rundll32.exe 70 2000 rundll32.exe 73 2000 rundll32.exe 76 2000 rundll32.exe 79 2000 rundll32.exe 80 2000 rundll32.exe 86 2000 rundll32.exe -
Program crash 5 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 836 2000 WerFault.exe rundll32.exe 4756 2000 WerFault.exe rundll32.exe 4696 2000 WerFault.exe rundll32.exe 3548 2000 WerFault.exe rundll32.exe 4456 2000 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4188 wrote to memory of 2000 4188 rundll32.exe rundll32.exe PID 4188 wrote to memory of 2000 4188 rundll32.exe rundll32.exe PID 4188 wrote to memory of 2000 4188 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7b8b3de47c3fd708b0bf453fac1ff706_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7b8b3de47c3fd708b0bf453fac1ff706_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
PID:2000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 6363⤵
- Program crash
PID:836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 8083⤵
- Program crash
PID:4756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 8403⤵
- Program crash
PID:4696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 9203⤵
- Program crash
PID:3548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 11203⤵
- Program crash
PID:4456
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3804 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:81⤵PID:3588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2000 -ip 20001⤵PID:3392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2000 -ip 20001⤵PID:1928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2000 -ip 20001⤵PID:1564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2000 -ip 20001⤵PID:220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2000 -ip 20001⤵PID:1392