Analysis

  • max time kernel
    142s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2024 06:39

General

  • Target

    JaffaCakes118_d50cbfa59875b7316debcb1017e9565921f87f4fe8e6d88b0b3264a7342eb879.dll

  • Size

    490KB

  • MD5

    925429061ee2b235de99b429d7b2f828

  • SHA1

    573b6354b46747c0d07be6aae2eeaa541da8d044

  • SHA256

    d50cbfa59875b7316debcb1017e9565921f87f4fe8e6d88b0b3264a7342eb879

  • SHA512

    c37b1f5398c6bacb5dc1ec2f832dd39912d1e96bd40959b5b385f01eee7621a593a8c6a08c4bf8ec7f1605e0c7b0b571029e8ea736df5e0226434e8ffabe34b4

  • SSDEEP

    12288:mFnmEQb6xK6EOcEELeBdUDBBe6pLtzPhGHUaR4:knmj6xK1y3Ik6TZGR4

Malware Config

Extracted

Family

icedid

Campaign

3467965077

C2

firenicatrible.com

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Icedid family
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d50cbfa59875b7316debcb1017e9565921f87f4fe8e6d88b0b3264a7342eb879.dll
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:3128

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3128-0-0x00000000029D0000-0x00000000029DE000-memory.dmp

    Filesize

    56KB

  • memory/3128-1-0x00000000029D0000-0x00000000029DE000-memory.dmp

    Filesize

    56KB