Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 18:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7de2125eba63b36cdc4f45b008a4118b_JaffaCakes118.dll
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
7de2125eba63b36cdc4f45b008a4118b_JaffaCakes118.dll
-
Size
211KB
-
MD5
7de2125eba63b36cdc4f45b008a4118b
-
SHA1
b1c3ec138e2f104bac76852bf0d2bb4708e67922
-
SHA256
d67e1fd5d40e841c1aedbbf65d5f72a69da5ac54e48ae92da1f428c9f18d8363
-
SHA512
cbe3a45f1afde4e695f66d6bfb98e10a3fba41c1d2ecb5eee15c3a2e7d52b6d58ef878071452dab26427607c83040a18745a7f17227bac6d74add4969ff9b2fc
-
SSDEEP
6144:6ZLwQyyWMa3NIBkL6LDW8dTZdw702edvxiuYOO6umz4N:6ZLwQyyHadIBkLIi8dTL2SvguYOO1mkN
Malware Config
Extracted
Family
icedid
C2
ldrstar.casa
Signatures
-
IcedID First Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral2/memory/456-1-0x00000000748C0000-0x000000007494C000-memory.dmp IcedidFirstLoader behavioral2/memory/456-2-0x00000000748C0000-0x000000007494C000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 14 IoCs
Processes:
rundll32.exeflow pid process 32 456 rundll32.exe 33 456 rundll32.exe 36 456 rundll32.exe 39 456 rundll32.exe 42 456 rundll32.exe 49 456 rundll32.exe 51 456 rundll32.exe 54 456 rundll32.exe 56 456 rundll32.exe 65 456 rundll32.exe 66 456 rundll32.exe 68 456 rundll32.exe 71 456 rundll32.exe 72 456 rundll32.exe -
Program crash 6 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 912 456 WerFault.exe rundll32.exe 4456 456 WerFault.exe rundll32.exe 408 456 WerFault.exe rundll32.exe 3396 456 WerFault.exe rundll32.exe 1560 456 WerFault.exe rundll32.exe 2172 456 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1504 wrote to memory of 456 1504 rundll32.exe rundll32.exe PID 1504 wrote to memory of 456 1504 rundll32.exe rundll32.exe PID 1504 wrote to memory of 456 1504 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7de2125eba63b36cdc4f45b008a4118b_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7de2125eba63b36cdc4f45b008a4118b_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
PID:456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 456 -s 6363⤵
- Program crash
PID:912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 456 -s 8003⤵
- Program crash
PID:4456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 456 -s 8163⤵
- Program crash
PID:408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 456 -s 12603⤵
- Program crash
PID:3396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 456 -s 8163⤵
- Program crash
PID:1560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 456 -s 14243⤵
- Program crash
PID:2172
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 456 -ip 4561⤵PID:4628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 456 -ip 4561⤵PID:1788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 456 -ip 4561⤵PID:2764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 456 -ip 4561⤵PID:2208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 456 -ip 4561⤵PID:4768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 456 -ip 4561⤵PID:916