Analysis

  • max time kernel
    141s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-12-2024 21:52

General

  • Target

    JaffaCakes118_66eed332ae23f802e2740322f11f304266e6965bb099a46e969800e8a7126628.dll

  • Size

    490KB

  • MD5

    5feb34a39e2c29130ea380c860ed2b00

  • SHA1

    1ccce48a3f756dee55b8e4978b1770b61fa35257

  • SHA256

    66eed332ae23f802e2740322f11f304266e6965bb099a46e969800e8a7126628

  • SHA512

    37e84b88d26ad704a8ba7e717c378715759d5f27db82f8958df70579c8dffe4342e38fe0f61e540c5ed87974a01f1e133cff1e1010156fc7f46f6c1da0eee6ce

  • SSDEEP

    12288:mFnmEQb6xK6EOcEELeBdUDBBe6pLtzPhGHUaR/:knmj6xK1y3Ik6TZGR/

Malware Config

Extracted

Family

icedid

Campaign

3467965077

C2

firenicatrible.com

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Icedid family
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_66eed332ae23f802e2740322f11f304266e6965bb099a46e969800e8a7126628.dll
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2116

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2116-0-0x00000000003E0000-0x00000000003EE000-memory.dmp

    Filesize

    56KB

  • memory/2116-1-0x00000000003E0000-0x00000000003EE000-memory.dmp

    Filesize

    56KB