Analysis
-
max time kernel
146s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29-07-2024 11:42
Static task
static1
Behavioral task
behavioral1
Sample
4446508bff628b75d9923a6d4cb0d55c_JaffaCakes118.dll
Resource
win7-20240708-en
General
-
Target
4446508bff628b75d9923a6d4cb0d55c_JaffaCakes118.dll
-
Size
267KB
-
MD5
4446508bff628b75d9923a6d4cb0d55c
-
SHA1
1521e01d1e76db8213214f88ab59313e185f117e
-
SHA256
50627d0516944503312951774b8b7586f9409f312b7742347697996c10ead658
-
SHA512
9ed64c0911def17e811b8ad2e9c64c86ce5681612b13c0601c80af3a95a53a6e913a7d8929ef44a75908f5b456735d9d61fe54a649b48ddd71c5bcc5ce196881
-
SSDEEP
3072:WKCvsQ1ZkyvvaVy5wW760YyUu5VELUUtg7+HqOtTsTERJLGvumPOUIrLeAg0FujH:LQrkoClvytr7UtkiBvPLiAOg3kaeXV6y
Malware Config
Extracted
icedid
wertigohol.click
Signatures
-
IcedID First Stage Loader 2 IoCs
resource yara_rule behavioral1/memory/1256-1-0x0000000073B30000-0x0000000074085000-memory.dmp IcedidFirstLoader behavioral1/memory/1256-2-0x0000000073B30000-0x0000000074085000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 34 IoCs
flow pid Process 3 1256 rundll32.exe 4 1256 rundll32.exe 6 1256 rundll32.exe 7 1256 rundll32.exe 10 1256 rundll32.exe 11 1256 rundll32.exe 13 1256 rundll32.exe 14 1256 rundll32.exe 16 1256 rundll32.exe 17 1256 rundll32.exe 18 1256 rundll32.exe 19 1256 rundll32.exe 21 1256 rundll32.exe 22 1256 rundll32.exe 24 1256 rundll32.exe 25 1256 rundll32.exe 27 1256 rundll32.exe 28 1256 rundll32.exe 30 1256 rundll32.exe 31 1256 rundll32.exe 32 1256 rundll32.exe 33 1256 rundll32.exe 35 1256 rundll32.exe 36 1256 rundll32.exe 38 1256 rundll32.exe 39 1256 rundll32.exe 41 1256 rundll32.exe 42 1256 rundll32.exe 44 1256 rundll32.exe 45 1256 rundll32.exe 46 1256 rundll32.exe 47 1256 rundll32.exe 49 1256 rundll32.exe 50 1256 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1056 wrote to memory of 1256 1056 rundll32.exe 28 PID 1056 wrote to memory of 1256 1056 rundll32.exe 28 PID 1056 wrote to memory of 1256 1056 rundll32.exe 28 PID 1056 wrote to memory of 1256 1056 rundll32.exe 28 PID 1056 wrote to memory of 1256 1056 rundll32.exe 28 PID 1056 wrote to memory of 1256 1056 rundll32.exe 28 PID 1056 wrote to memory of 1256 1056 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4446508bff628b75d9923a6d4cb0d55c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4446508bff628b75d9923a6d4cb0d55c_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:1256
-