Analysis
-
max time kernel
148s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 20:53
Static task
static1
Behavioral task
behavioral1
Sample
00df497293a48b38b4776e560ae1f412_JaffaCakes118.dll
Resource
win7-20240708-en
General
-
Target
00df497293a48b38b4776e560ae1f412_JaffaCakes118.dll
-
Size
267KB
-
MD5
00df497293a48b38b4776e560ae1f412
-
SHA1
9680236c5a8a699f43ed2947d042504582e8097c
-
SHA256
0de87bcd83237b564ed508b574d0195c7c51220571c22b44f0f188af1369e558
-
SHA512
b6fe1159db1556efdee40e1fbf5e2fd65e192645cc292e3cfb95a6351c2bc3319cc67ab9574917a47c467d24932d77fb76c14c2ebcbd53094955d8eccfa3e9b2
-
SSDEEP
3072:WKCvsQ1ZkyvvaVD5wW760YyUu5VELUUtg7+HqOtTsTERJLGvumPOUIrLeAg0FujH:LQrkoCCvytr7UtkiBvPLiAOg3kaeXV6y
Malware Config
Extracted
icedid
wertigohol.click
Signatures
-
IcedID First Stage Loader 2 IoCs
resource yara_rule behavioral2/memory/808-1-0x0000000074CE0000-0x0000000075235000-memory.dmp IcedidFirstLoader behavioral2/memory/808-2-0x0000000074CE0000-0x0000000075235000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 19 IoCs
flow pid Process 39 808 rundll32.exe 41 808 rundll32.exe 42 808 rundll32.exe 43 808 rundll32.exe 47 808 rundll32.exe 51 808 rundll32.exe 57 808 rundll32.exe 62 808 rundll32.exe 66 808 rundll32.exe 70 808 rundll32.exe 71 808 rundll32.exe 77 808 rundll32.exe 90 808 rundll32.exe 91 808 rundll32.exe 92 808 rundll32.exe 95 808 rundll32.exe 97 808 rundll32.exe 98 808 rundll32.exe 99 808 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1004 wrote to memory of 808 1004 rundll32.exe 84 PID 1004 wrote to memory of 808 1004 rundll32.exe 84 PID 1004 wrote to memory of 808 1004 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\00df497293a48b38b4776e560ae1f412_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\00df497293a48b38b4776e560ae1f412_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:808
-