Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-08-2024 15:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8f33b7393dc6114e419467c80f64dce7_JaffaCakes118.dll
Resource
win7-20240704-en
windows7-x64
5 signatures
150 seconds
General
-
Target
8f33b7393dc6114e419467c80f64dce7_JaffaCakes118.dll
-
Size
224KB
-
MD5
8f33b7393dc6114e419467c80f64dce7
-
SHA1
173e8df464fb2a027ef5a3ee462dff0798036698
-
SHA256
f751ee786098e98fbcb85cf866bc42222ef4eb46a835224c1535e0e5bf37ffe4
-
SHA512
526efb46d9eb6b547f20096145b4ae991a6519faef6ceb397ba7f26f6c7f1106d2770d1b12bcd0c2b73c358c812bd825577f7e5f78d5a1b7ea6b4583a17ec27b
-
SSDEEP
3072:U6VYA6I0oElwS9ciW+eM+ppv2LHFip6+7bUSrtB0J3B1rq46vqDyPIKpPLq/M:UWxXElK+Spv2owSlt6JR1YSDuImq/M
Malware Config
Extracted
Family
icedid
C2
loadberlin.casa
Signatures
-
IcedID First Stage Loader 1 IoCs
resource yara_rule behavioral2/memory/1088-2-0x0000000074BF0000-0x0000000074C34000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 13 IoCs
flow pid Process 41 1088 rundll32.exe 43 1088 rundll32.exe 47 1088 rundll32.exe 50 1088 rundll32.exe 53 1088 rundll32.exe 61 1088 rundll32.exe 67 1088 rundll32.exe 72 1088 rundll32.exe 84 1088 rundll32.exe 87 1088 rundll32.exe 89 1088 rundll32.exe 90 1088 rundll32.exe 93 1088 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4348 wrote to memory of 1088 4348 rundll32.exe 84 PID 4348 wrote to memory of 1088 4348 rundll32.exe 84 PID 4348 wrote to memory of 1088 4348 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8f33b7393dc6114e419467c80f64dce7_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8f33b7393dc6114e419467c80f64dce7_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:1088
-