Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 06:44
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ad3778f31b3d3cc4ca4c51e3ffe9464a_JaffaCakes118.dll
Resource
win7-20231129-en
windows7-x64
4 signatures
150 seconds
General
-
Target
ad3778f31b3d3cc4ca4c51e3ffe9464a_JaffaCakes118.dll
-
Size
421KB
-
MD5
ad3778f31b3d3cc4ca4c51e3ffe9464a
-
SHA1
da0f1fb7b9ca42f6ea7298f19a54121fd2660737
-
SHA256
4df39fd80257e14192e2d2edc4500883edd7921e0be92d664ec4b995d8f82f24
-
SHA512
29b4ee6cc0563277283e3934c80cc94327774892f81338b459804d97e2999d2840e59518981bd26b748aec88c8f111e0d8bad6df0dc9cf3c6beb3ace2bc64a7b
-
SSDEEP
6144:Ipzb4zDZWem6SDwg21fh0k2Pk4+o9ydY//iptLNu5H32KgKC:IpzWDYemdkh1fj/dY/ctLNu5H3CK
Malware Config
Extracted
Family
icedid
C2
ldrmercury.casa
Signatures
-
IcedID First Stage Loader 2 IoCs
resource yara_rule behavioral2/memory/4448-1-0x0000000074BB0000-0x0000000074C73000-memory.dmp IcedidFirstLoader behavioral2/memory/4448-2-0x0000000074BB0000-0x0000000074C73000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 14 IoCs
flow pid Process 33 4448 rundll32.exe 36 4448 rundll32.exe 40 4448 rundll32.exe 42 4448 rundll32.exe 46 4448 rundll32.exe 52 4448 rundll32.exe 53 4448 rundll32.exe 57 4448 rundll32.exe 60 4448 rundll32.exe 67 4448 rundll32.exe 69 4448 rundll32.exe 72 4448 rundll32.exe 73 4448 rundll32.exe 75 4448 rundll32.exe -
Program crash 6 IoCs
pid pid_target Process procid_target 3080 4448 WerFault.exe 81 1664 4448 WerFault.exe 81 4952 4448 WerFault.exe 81 2500 4448 WerFault.exe 81 1996 4448 WerFault.exe 81 656 4448 WerFault.exe 81 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1736 wrote to memory of 4448 1736 rundll32.exe 81 PID 1736 wrote to memory of 4448 1736 rundll32.exe 81 PID 1736 wrote to memory of 4448 1736 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ad3778f31b3d3cc4ca4c51e3ffe9464a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ad3778f31b3d3cc4ca4c51e3ffe9464a_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
PID:4448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4448 -s 6363⤵
- Program crash
PID:3080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4448 -s 7963⤵
- Program crash
PID:1664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4448 -s 8163⤵
- Program crash
PID:4952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4448 -s 12163⤵
- Program crash
PID:2500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4448 -s 13043⤵
- Program crash
PID:1996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4448 -s 15163⤵
- Program crash
PID:656
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4448 -ip 44481⤵PID:2008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4448 -ip 44481⤵PID:3936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4448 -ip 44481⤵PID:3016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4448 -ip 44481⤵PID:4304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4448 -ip 44481⤵PID:2372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4448 -ip 44481⤵PID:1900