Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 21:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
db355c0cb3be879a1207cf8a679069ee_JaffaCakes118.dll
Resource
win7-20240903-en
windows7-x64
4 signatures
150 seconds
General
-
Target
db355c0cb3be879a1207cf8a679069ee_JaffaCakes118.dll
-
Size
120KB
-
MD5
db355c0cb3be879a1207cf8a679069ee
-
SHA1
49fc991853c5a9e73824e894bfbefb45c61d322f
-
SHA256
866aa2c9699ab1427f23c3754e7b94358366d2c55e2ff512f26f16a22fa443b8
-
SHA512
1456cec9c3848732d12ef51679737a4486cc4788a70a557af75b44e1e6c49b740684bd20652b5c6798bdbd5e31a1f9cce402b429456ff848b2c17c08d8c7bf91
-
SSDEEP
3072:tpteWUxswmB6cKEyYo8wNSNbgRdN1v48zdtye:cswm5KloaSNERdN1Agr
Malware Config
Extracted
Family
icedid
C2
loadro3.casa
Signatures
-
IcedID First Stage Loader 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1696-0-0x00000000000E0000-0x00000000000EA000-memory.dmp IcedidFirstLoader behavioral1/memory/1696-12-0x00000000000C0000-0x00000000000C8000-memory.dmp IcedidFirstLoader behavioral1/memory/1696-8-0x0000000000280000-0x0000000000286000-memory.dmp IcedidFirstLoader behavioral1/memory/1696-4-0x00000000001E0000-0x00000000001E8000-memory.dmp IcedidFirstLoader -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
regsvr32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
regsvr32.exedescription pid Process procid_target PID 1620 wrote to memory of 1696 1620 regsvr32.exe 30 PID 1620 wrote to memory of 1696 1620 regsvr32.exe 30 PID 1620 wrote to memory of 1696 1620 regsvr32.exe 30 PID 1620 wrote to memory of 1696 1620 regsvr32.exe 30 PID 1620 wrote to memory of 1696 1620 regsvr32.exe 30 PID 1620 wrote to memory of 1696 1620 regsvr32.exe 30 PID 1620 wrote to memory of 1696 1620 regsvr32.exe 30
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\db355c0cb3be879a1207cf8a679069ee_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\db355c0cb3be879a1207cf8a679069ee_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:1696
-