Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-08-2024 15:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c53fe60ca1b3b60357707c707fd4376d_JaffaCakes118.dll
Resource
win7-20240705-en
windows7-x64
5 signatures
150 seconds
General
-
Target
c53fe60ca1b3b60357707c707fd4376d_JaffaCakes118.dll
-
Size
211KB
-
MD5
c53fe60ca1b3b60357707c707fd4376d
-
SHA1
81f8d20e74ce9ac1aac4595a32512d670b533ad4
-
SHA256
74c2d430eb964fbf5b3a1e37bb6f8770e571ef8998f71d945a479bba4a42d2cc
-
SHA512
2079cd98b135323aa7a625419f48423186c7f2bf4a663729f89aed6baa0fed9627d7975871991cfa6b273c97ca58f5f33c144ef5d9e2c7e41ee5ae4ee5700890
-
SSDEEP
6144:6ZLw6yyWMa3NIBkL6LDW8dTZdw702edvxiuYOO6umz4N:6ZLw6yyHadIBkLIi8dTL2SvguYOO1mkN
Malware Config
Extracted
Family
icedid
C2
ldrstar.casa
Signatures
-
IcedID First Stage Loader 2 IoCs
resource yara_rule behavioral2/memory/4384-1-0x0000000074A80000-0x0000000074B0C000-memory.dmp IcedidFirstLoader behavioral2/memory/4384-2-0x0000000074A80000-0x0000000074B0C000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 14 IoCs
flow pid Process 43 4384 rundll32.exe 46 4384 rundll32.exe 49 4384 rundll32.exe 52 4384 rundll32.exe 59 4384 rundll32.exe 63 4384 rundll32.exe 68 4384 rundll32.exe 70 4384 rundll32.exe 76 4384 rundll32.exe 88 4384 rundll32.exe 90 4384 rundll32.exe 93 4384 rundll32.exe 94 4384 rundll32.exe 96 4384 rundll32.exe -
Program crash 6 IoCs
pid pid_target Process procid_target 400 4384 WerFault.exe 84 2616 4384 WerFault.exe 84 852 4384 WerFault.exe 84 4356 4384 WerFault.exe 84 508 4384 WerFault.exe 84 4880 4384 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2120 wrote to memory of 4384 2120 rundll32.exe 84 PID 2120 wrote to memory of 4384 2120 rundll32.exe 84 PID 2120 wrote to memory of 4384 2120 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c53fe60ca1b3b60357707c707fd4376d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c53fe60ca1b3b60357707c707fd4376d_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:4384 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4384 -s 6363⤵
- Program crash
PID:400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4384 -s 8043⤵
- Program crash
PID:2616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4384 -s 8363⤵
- Program crash
PID:852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4384 -s 12163⤵
- Program crash
PID:4356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4384 -s 13003⤵
- Program crash
PID:508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4384 -s 15203⤵
- Program crash
PID:4880
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4384 -ip 43841⤵PID:4860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4384 -ip 43841⤵PID:4312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4384 -ip 43841⤵PID:1468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4384 -ip 43841⤵PID:4368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4384 -ip 43841⤵PID:2844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4384 -ip 43841⤵PID:3700