Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
28-07-2024 22:13
Static task
static1
Behavioral task
behavioral1
Sample
27330976e897b20cce8347152eac445a_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
27330976e897b20cce8347152eac445a_JaffaCakes118.dll
-
Size
224KB
-
MD5
27330976e897b20cce8347152eac445a
-
SHA1
5827bcd96ea651b43ec0fabd84240c53ed9752bf
-
SHA256
22015e9ad69ee50307e6eb4484181196070e36ab9fb46f5c8f883ffeffaa60e3
-
SHA512
e45be7fe6b50893e9bb26e5d7deac0a6c2df1920056f34e81a90eb5744b8a544860285fbcd9a4df5a6b18de3ecf22b5bbedcaea759967802584807ef6643ab56
-
SSDEEP
3072:U6VYA6I0oElwS9ciW+eM+ppv2LHFOp6+7bUSrtB0J3B1rq46vqDyPIKpPLq/M:UWxXElK+Spv2swSlt6JR1YSDuImq/M
Malware Config
Extracted
icedid
loadberlin.casa
Signatures
-
IcedID First Stage Loader 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4656-1-0x0000000074A20000-0x0000000074A64000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 18 IoCs
Processes:
rundll32.exeflow pid process 8 4656 rundll32.exe 10 4656 rundll32.exe 14 4656 rundll32.exe 17 4656 rundll32.exe 20 4656 rundll32.exe 27 4656 rundll32.exe 29 4656 rundll32.exe 30 4656 rundll32.exe 33 4656 rundll32.exe 36 4656 rundll32.exe 38 4656 rundll32.exe 41 4656 rundll32.exe 42 4656 rundll32.exe 45 4656 rundll32.exe 47 4656 rundll32.exe 48 4656 rundll32.exe 49 4656 rundll32.exe 52 4656 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4724 wrote to memory of 4656 4724 rundll32.exe rundll32.exe PID 4724 wrote to memory of 4656 4724 rundll32.exe rundll32.exe PID 4724 wrote to memory of 4656 4724 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\27330976e897b20cce8347152eac445a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\27330976e897b20cce8347152eac445a_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:4656
-