Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
30-05-2024 01:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
82ac29c322c3a97d6b0a0bf528f28097_JaffaCakes118.dll
Resource
win7-20240508-en
windows7-x64
4 signatures
150 seconds
General
-
Target
82ac29c322c3a97d6b0a0bf528f28097_JaffaCakes118.dll
-
Size
171KB
-
MD5
82ac29c322c3a97d6b0a0bf528f28097
-
SHA1
50d21c573262ba613796abd958b490fb6d65c407
-
SHA256
7c94b78d14c95b438b0af4eb93596c2f7a64d8a9a1b2c9b300f5d4c43661a9b9
-
SHA512
a2a48daf57cb7f48f055e5c6c38f15f81376195284ac4d10fe39f4ddecd5a1ae80f3a782fdcfce85620c2d4684140df29f20b17bba81a64dd262b2ee88a5d1f6
-
SSDEEP
3072:aGlF282vlhUDj+PoJFXpeZpaZARWQJ1h52iWNgdxeoRUxNGhLKgUQh0BVj:H7eyaPonp2AmRWg1h3NxqxNuLKQyBx
Malware Config
Extracted
Family
icedid
C2
ldrpeso.casa
Signatures
-
IcedID First Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2740-0-0x00000000753A0000-0x0000000075422000-memory.dmp IcedidFirstLoader behavioral1/memory/2740-2-0x00000000753A0000-0x0000000075422000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 34 IoCs
Processes:
rundll32.exeflow pid process 3 2740 rundll32.exe 4 2740 rundll32.exe 6 2740 rundll32.exe 7 2740 rundll32.exe 9 2740 rundll32.exe 10 2740 rundll32.exe 12 2740 rundll32.exe 13 2740 rundll32.exe 15 2740 rundll32.exe 16 2740 rundll32.exe 20 2740 rundll32.exe 21 2740 rundll32.exe 22 2740 rundll32.exe 23 2740 rundll32.exe 25 2740 rundll32.exe 26 2740 rundll32.exe 28 2740 rundll32.exe 29 2740 rundll32.exe 31 2740 rundll32.exe 32 2740 rundll32.exe 34 2740 rundll32.exe 35 2740 rundll32.exe 36 2740 rundll32.exe 37 2740 rundll32.exe 39 2740 rundll32.exe 40 2740 rundll32.exe 42 2740 rundll32.exe 43 2740 rundll32.exe 45 2740 rundll32.exe 46 2740 rundll32.exe 48 2740 rundll32.exe 49 2740 rundll32.exe 50 2740 rundll32.exe 51 2740 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1964 wrote to memory of 2740 1964 rundll32.exe rundll32.exe PID 1964 wrote to memory of 2740 1964 rundll32.exe rundll32.exe PID 1964 wrote to memory of 2740 1964 rundll32.exe rundll32.exe PID 1964 wrote to memory of 2740 1964 rundll32.exe rundll32.exe PID 1964 wrote to memory of 2740 1964 rundll32.exe rundll32.exe PID 1964 wrote to memory of 2740 1964 rundll32.exe rundll32.exe PID 1964 wrote to memory of 2740 1964 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\82ac29c322c3a97d6b0a0bf528f28097_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\82ac29c322c3a97d6b0a0bf528f28097_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
PID:2740
-