Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 08:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ad88c54c37ce7d75790df768ef14e2f5_JaffaCakes118.dll
Resource
win7-20240611-en
windows7-x64
4 signatures
150 seconds
General
-
Target
ad88c54c37ce7d75790df768ef14e2f5_JaffaCakes118.dll
-
Size
211KB
-
MD5
ad88c54c37ce7d75790df768ef14e2f5
-
SHA1
298d7ba10332a0b9d220533ba337c2455d2f70e2
-
SHA256
9c2b9591aa625e3dd4d8eae345b24e331bf731c9d5fa6455ac8e79bd6ec5d0d0
-
SHA512
51c9b720c0a3e04d32e222b63a68e47accd3732992391897ed4db80b7160dab4cb72c150de185bc0b005878107fa556ba4a0154ff18c83e212b12aef9d847325
-
SSDEEP
6144:6ZLwyyyWMa3NIBkL6LDW8dTZdw702edvxiuYOO6umz4N:6ZLwyyyHadIBkLIi8dTL2SvguYOO1mkN
Malware Config
Extracted
Family
icedid
C2
ldrstar.casa
Signatures
-
IcedID First Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2372-0-0x0000000074A20000-0x0000000074AAC000-memory.dmp IcedidFirstLoader behavioral1/memory/2372-2-0x0000000074A20000-0x0000000074AAC000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 34 IoCs
Processes:
rundll32.exeflow pid process 3 2372 rundll32.exe 4 2372 rundll32.exe 6 2372 rundll32.exe 7 2372 rundll32.exe 9 2372 rundll32.exe 10 2372 rundll32.exe 12 2372 rundll32.exe 13 2372 rundll32.exe 17 2372 rundll32.exe 18 2372 rundll32.exe 19 2372 rundll32.exe 20 2372 rundll32.exe 22 2372 rundll32.exe 23 2372 rundll32.exe 25 2372 rundll32.exe 26 2372 rundll32.exe 28 2372 rundll32.exe 29 2372 rundll32.exe 31 2372 rundll32.exe 32 2372 rundll32.exe 33 2372 rundll32.exe 34 2372 rundll32.exe 36 2372 rundll32.exe 37 2372 rundll32.exe 39 2372 rundll32.exe 40 2372 rundll32.exe 42 2372 rundll32.exe 43 2372 rundll32.exe 45 2372 rundll32.exe 46 2372 rundll32.exe 47 2372 rundll32.exe 48 2372 rundll32.exe 50 2372 rundll32.exe 51 2372 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2204 wrote to memory of 2372 2204 rundll32.exe rundll32.exe PID 2204 wrote to memory of 2372 2204 rundll32.exe rundll32.exe PID 2204 wrote to memory of 2372 2204 rundll32.exe rundll32.exe PID 2204 wrote to memory of 2372 2204 rundll32.exe rundll32.exe PID 2204 wrote to memory of 2372 2204 rundll32.exe rundll32.exe PID 2204 wrote to memory of 2372 2204 rundll32.exe rundll32.exe PID 2204 wrote to memory of 2372 2204 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ad88c54c37ce7d75790df768ef14e2f5_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ad88c54c37ce7d75790df768ef14e2f5_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
PID:2372
-