Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12-08-2024 15:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8f33b7393dc6114e419467c80f64dce7_JaffaCakes118.dll
Resource
win7-20240704-en
windows7-x64
5 signatures
150 seconds
General
-
Target
8f33b7393dc6114e419467c80f64dce7_JaffaCakes118.dll
-
Size
224KB
-
MD5
8f33b7393dc6114e419467c80f64dce7
-
SHA1
173e8df464fb2a027ef5a3ee462dff0798036698
-
SHA256
f751ee786098e98fbcb85cf866bc42222ef4eb46a835224c1535e0e5bf37ffe4
-
SHA512
526efb46d9eb6b547f20096145b4ae991a6519faef6ceb397ba7f26f6c7f1106d2770d1b12bcd0c2b73c358c812bd825577f7e5f78d5a1b7ea6b4583a17ec27b
-
SSDEEP
3072:U6VYA6I0oElwS9ciW+eM+ppv2LHFip6+7bUSrtB0J3B1rq46vqDyPIKpPLq/M:UWxXElK+Spv2owSlt6JR1YSDuImq/M
Malware Config
Extracted
Family
icedid
C2
loadberlin.casa
Signatures
-
IcedID First Stage Loader 1 IoCs
resource yara_rule behavioral1/memory/1224-2-0x0000000074CC0000-0x0000000074D04000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 28 IoCs
flow pid Process 3 1224 rundll32.exe 4 1224 rundll32.exe 6 1224 rundll32.exe 7 1224 rundll32.exe 9 1224 rundll32.exe 10 1224 rundll32.exe 12 1224 rundll32.exe 13 1224 rundll32.exe 15 1224 rundll32.exe 16 1224 rundll32.exe 20 1224 rundll32.exe 21 1224 rundll32.exe 23 1224 rundll32.exe 24 1224 rundll32.exe 26 1224 rundll32.exe 27 1224 rundll32.exe 29 1224 rundll32.exe 30 1224 rundll32.exe 31 1224 rundll32.exe 32 1224 rundll32.exe 34 1224 rundll32.exe 35 1224 rundll32.exe 37 1224 rundll32.exe 38 1224 rundll32.exe 40 1224 rundll32.exe 41 1224 rundll32.exe 43 1224 rundll32.exe 44 1224 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2872 wrote to memory of 1224 2872 rundll32.exe 28 PID 2872 wrote to memory of 1224 2872 rundll32.exe 28 PID 2872 wrote to memory of 1224 2872 rundll32.exe 28 PID 2872 wrote to memory of 1224 2872 rundll32.exe 28 PID 2872 wrote to memory of 1224 2872 rundll32.exe 28 PID 2872 wrote to memory of 1224 2872 rundll32.exe 28 PID 2872 wrote to memory of 1224 2872 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8f33b7393dc6114e419467c80f64dce7_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8f33b7393dc6114e419467c80f64dce7_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:1224
-