Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 15:06
Static task
static1
Behavioral task
behavioral1
Sample
e2c487a87a5be69af4a86f82317fa941_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
e2c487a87a5be69af4a86f82317fa941_JaffaCakes118.dll
-
Size
267KB
-
MD5
e2c487a87a5be69af4a86f82317fa941
-
SHA1
046ce6a92833ac623769c4bee4e6e656c8d40f22
-
SHA256
1fc02c2bbb954f1fbfee85140618025b23c6d3a8a793b28909139a43e68e6adb
-
SHA512
a0e0002591a1f972f0e443c4586c8b25539a5e2a3f439e6534fa88bb967e38d6e158709d9b292b37bd3a527e7055196537ebd937eb9fc88e66feeed84e8acada
-
SSDEEP
3072:WKCvsQ1ZkyvvaVj5wW760YyUu5VELUUtg7+HqOtTsTERJLGvumPOUIrLeAg0FujH:LQrkoCSvytr7UtkiBvPLiAOg3kaeXV6y
Malware Config
Extracted
icedid
wertigohol.click
Signatures
-
IcedID First Stage Loader 2 IoCs
resource yara_rule behavioral2/memory/916-1-0x0000000074520000-0x0000000074A75000-memory.dmp IcedidFirstLoader behavioral2/memory/916-2-0x0000000074520000-0x0000000074A75000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 14 IoCs
flow pid Process 35 916 rundll32.exe 38 916 rundll32.exe 42 916 rundll32.exe 45 916 rundll32.exe 49 916 rundll32.exe 51 916 rundll32.exe 54 916 rundll32.exe 58 916 rundll32.exe 63 916 rundll32.exe 65 916 rundll32.exe 66 916 rundll32.exe 69 916 rundll32.exe 71 916 rundll32.exe 72 916 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1792 wrote to memory of 916 1792 rundll32.exe 82 PID 1792 wrote to memory of 916 1792 rundll32.exe 82 PID 1792 wrote to memory of 916 1792 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e2c487a87a5be69af4a86f82317fa941_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e2c487a87a5be69af4a86f82317fa941_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:916
-