Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28-07-2024 22:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
27330976e897b20cce8347152eac445a_JaffaCakes118.dll
Resource
win7-20240704-en
windows7-x64
5 signatures
150 seconds
General
-
Target
27330976e897b20cce8347152eac445a_JaffaCakes118.dll
-
Size
224KB
-
MD5
27330976e897b20cce8347152eac445a
-
SHA1
5827bcd96ea651b43ec0fabd84240c53ed9752bf
-
SHA256
22015e9ad69ee50307e6eb4484181196070e36ab9fb46f5c8f883ffeffaa60e3
-
SHA512
e45be7fe6b50893e9bb26e5d7deac0a6c2df1920056f34e81a90eb5744b8a544860285fbcd9a4df5a6b18de3ecf22b5bbedcaea759967802584807ef6643ab56
-
SSDEEP
3072:U6VYA6I0oElwS9ciW+eM+ppv2LHFOp6+7bUSrtB0J3B1rq46vqDyPIKpPLq/M:UWxXElK+Spv2swSlt6JR1YSDuImq/M
Malware Config
Extracted
Family
icedid
C2
loadberlin.casa
Signatures
-
IcedID First Stage Loader 3 IoCs
resource yara_rule behavioral1/memory/2132-2-0x0000000074B50000-0x0000000074B94000-memory.dmp IcedidFirstLoader behavioral1/memory/2132-0-0x0000000074B50000-0x0000000074B94000-memory.dmp IcedidFirstLoader behavioral1/memory/2132-3-0x0000000074B50000-0x0000000074B94000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 34 IoCs
flow pid Process 3 2132 rundll32.exe 4 2132 rundll32.exe 6 2132 rundll32.exe 7 2132 rundll32.exe 9 2132 rundll32.exe 10 2132 rundll32.exe 12 2132 rundll32.exe 13 2132 rundll32.exe 15 2132 rundll32.exe 16 2132 rundll32.exe 20 2132 rundll32.exe 21 2132 rundll32.exe 23 2132 rundll32.exe 24 2132 rundll32.exe 26 2132 rundll32.exe 27 2132 rundll32.exe 29 2132 rundll32.exe 30 2132 rundll32.exe 32 2132 rundll32.exe 33 2132 rundll32.exe 35 2132 rundll32.exe 36 2132 rundll32.exe 38 2132 rundll32.exe 39 2132 rundll32.exe 41 2132 rundll32.exe 42 2132 rundll32.exe 44 2132 rundll32.exe 45 2132 rundll32.exe 46 2132 rundll32.exe 47 2132 rundll32.exe 49 2132 rundll32.exe 50 2132 rundll32.exe 52 2132 rundll32.exe 53 2132 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2132 2060 rundll32.exe 30 PID 2060 wrote to memory of 2132 2060 rundll32.exe 30 PID 2060 wrote to memory of 2132 2060 rundll32.exe 30 PID 2060 wrote to memory of 2132 2060 rundll32.exe 30 PID 2060 wrote to memory of 2132 2060 rundll32.exe 30 PID 2060 wrote to memory of 2132 2060 rundll32.exe 30 PID 2060 wrote to memory of 2132 2060 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\27330976e897b20cce8347152eac445a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\27330976e897b20cce8347152eac445a_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2132
-