Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 08:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ad88c54c37ce7d75790df768ef14e2f5_JaffaCakes118.dll
Resource
win7-20240611-en
windows7-x64
4 signatures
150 seconds
General
-
Target
ad88c54c37ce7d75790df768ef14e2f5_JaffaCakes118.dll
-
Size
211KB
-
MD5
ad88c54c37ce7d75790df768ef14e2f5
-
SHA1
298d7ba10332a0b9d220533ba337c2455d2f70e2
-
SHA256
9c2b9591aa625e3dd4d8eae345b24e331bf731c9d5fa6455ac8e79bd6ec5d0d0
-
SHA512
51c9b720c0a3e04d32e222b63a68e47accd3732992391897ed4db80b7160dab4cb72c150de185bc0b005878107fa556ba4a0154ff18c83e212b12aef9d847325
-
SSDEEP
6144:6ZLwyyyWMa3NIBkL6LDW8dTZdw702edvxiuYOO6umz4N:6ZLwyyyHadIBkLIi8dTL2SvguYOO1mkN
Malware Config
Extracted
Family
icedid
C2
ldrstar.casa
Signatures
-
IcedID First Stage Loader 2 IoCs
resource yara_rule behavioral2/memory/3184-1-0x00000000750D0000-0x000000007515C000-memory.dmp IcedidFirstLoader behavioral2/memory/3184-2-0x00000000750D0000-0x000000007515C000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 15 IoCs
flow pid Process 32 3184 rundll32.exe 33 3184 rundll32.exe 36 3184 rundll32.exe 39 3184 rundll32.exe 42 3184 rundll32.exe 50 3184 rundll32.exe 53 3184 rundll32.exe 55 3184 rundll32.exe 57 3184 rundll32.exe 64 3184 rundll32.exe 65 3184 rundll32.exe 67 3184 rundll32.exe 70 3184 rundll32.exe 71 3184 rundll32.exe 75 3184 rundll32.exe -
Program crash 5 IoCs
pid pid_target Process procid_target 2076 3184 WerFault.exe 82 1964 3184 WerFault.exe 82 4052 3184 WerFault.exe 82 4904 3184 WerFault.exe 82 5008 3184 WerFault.exe 82 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2172 wrote to memory of 3184 2172 rundll32.exe 82 PID 2172 wrote to memory of 3184 2172 rundll32.exe 82 PID 2172 wrote to memory of 3184 2172 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ad88c54c37ce7d75790df768ef14e2f5_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ad88c54c37ce7d75790df768ef14e2f5_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
PID:3184 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 6363⤵
- Program crash
PID:2076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 8003⤵
- Program crash
PID:1964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 8363⤵
- Program crash
PID:4052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 11083⤵
- Program crash
PID:4904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 10043⤵
- Program crash
PID:5008
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3184 -ip 31841⤵PID:1408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3184 -ip 31841⤵PID:1692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3184 -ip 31841⤵PID:4100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3184 -ip 31841⤵PID:4048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3184 -ip 31841⤵PID:3516