Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 20:53
Static task
static1
Behavioral task
behavioral1
Sample
00df497293a48b38b4776e560ae1f412_JaffaCakes118.dll
Resource
win7-20240708-en
General
-
Target
00df497293a48b38b4776e560ae1f412_JaffaCakes118.dll
-
Size
267KB
-
MD5
00df497293a48b38b4776e560ae1f412
-
SHA1
9680236c5a8a699f43ed2947d042504582e8097c
-
SHA256
0de87bcd83237b564ed508b574d0195c7c51220571c22b44f0f188af1369e558
-
SHA512
b6fe1159db1556efdee40e1fbf5e2fd65e192645cc292e3cfb95a6351c2bc3319cc67ab9574917a47c467d24932d77fb76c14c2ebcbd53094955d8eccfa3e9b2
-
SSDEEP
3072:WKCvsQ1ZkyvvaVD5wW760YyUu5VELUUtg7+HqOtTsTERJLGvumPOUIrLeAg0FujH:LQrkoCCvytr7UtkiBvPLiAOg3kaeXV6y
Malware Config
Extracted
icedid
wertigohol.click
Signatures
-
IcedID First Stage Loader 1 IoCs
resource yara_rule behavioral1/memory/2684-1-0x0000000074050000-0x00000000745A5000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 30 IoCs
flow pid Process 3 2684 rundll32.exe 4 2684 rundll32.exe 6 2684 rundll32.exe 7 2684 rundll32.exe 10 2684 rundll32.exe 11 2684 rundll32.exe 13 2684 rundll32.exe 14 2684 rundll32.exe 16 2684 rundll32.exe 17 2684 rundll32.exe 18 2684 rundll32.exe 19 2684 rundll32.exe 21 2684 rundll32.exe 22 2684 rundll32.exe 24 2684 rundll32.exe 25 2684 rundll32.exe 27 2684 rundll32.exe 28 2684 rundll32.exe 30 2684 rundll32.exe 31 2684 rundll32.exe 32 2684 rundll32.exe 33 2684 rundll32.exe 35 2684 rundll32.exe 36 2684 rundll32.exe 38 2684 rundll32.exe 39 2684 rundll32.exe 41 2684 rundll32.exe 42 2684 rundll32.exe 44 2684 rundll32.exe 45 2684 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2632 wrote to memory of 2684 2632 rundll32.exe 30 PID 2632 wrote to memory of 2684 2632 rundll32.exe 30 PID 2632 wrote to memory of 2684 2632 rundll32.exe 30 PID 2632 wrote to memory of 2684 2632 rundll32.exe 30 PID 2632 wrote to memory of 2684 2632 rundll32.exe 30 PID 2632 wrote to memory of 2684 2632 rundll32.exe 30 PID 2632 wrote to memory of 2684 2632 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\00df497293a48b38b4776e560ae1f412_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\00df497293a48b38b4776e560ae1f412_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2684
-