Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2024 18:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c155e8c50dd8217aaf802818cfb2bd84_JaffaCakes118.dll
Resource
win7-20240704-en
windows7-x64
4 signatures
150 seconds
General
-
Target
c155e8c50dd8217aaf802818cfb2bd84_JaffaCakes118.dll
-
Size
120KB
-
MD5
c155e8c50dd8217aaf802818cfb2bd84
-
SHA1
9bf4ddeef59699c40f075cafb1137e1ad6686ed7
-
SHA256
f90a1824f690bcd5c333bd78de0164174fffb12160c26699d6cd17cc10b71a49
-
SHA512
7ad3f8c43d588ebd2524798b64d29cb566d09a44999d4feb15a2d774db285aa02b8434bfcced042b127310cfebcdaaf0dc806b199756766b5b7aa87bb1a1b239
-
SSDEEP
3072:za+dUDMZJjkzSzh25YohAUwr3XnsOOujmZOt9:wMZSzSzhA1rwDXnhZCS9
Malware Config
Extracted
Family
icedid
C2
loadwe4.casa
Signatures
-
IcedID First Stage Loader 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1260-0-0x00000000009B0000-0x00000000009BA000-memory.dmp IcedidFirstLoader behavioral2/memory/1260-7-0x00000000009A0000-0x00000000009A8000-memory.dmp IcedidFirstLoader behavioral2/memory/1260-4-0x0000000000AC0000-0x0000000000AC8000-memory.dmp IcedidFirstLoader behavioral2/memory/1260-8-0x0000000000AE0000-0x0000000000AE6000-memory.dmp IcedidFirstLoader -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
regsvr32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid process target process PID 1648 wrote to memory of 1260 1648 regsvr32.exe regsvr32.exe PID 1648 wrote to memory of 1260 1648 regsvr32.exe regsvr32.exe PID 1648 wrote to memory of 1260 1648 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\c155e8c50dd8217aaf802818cfb2bd84_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\c155e8c50dd8217aaf802818cfb2bd84_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:1260
-