Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2024 08:15

General

  • Target

    JaffaCakes118_c9127afe8f957f91a0f51025537fbcc23c2a6347c76e5f23a070985253aac0b5.dll

  • Size

    490KB

  • MD5

    e1c31ca954e2881a3228420d82605655

  • SHA1

    835952141fc4cf9859b717735f31dc12cd3edaec

  • SHA256

    c9127afe8f957f91a0f51025537fbcc23c2a6347c76e5f23a070985253aac0b5

  • SHA512

    619ec626a3a2703745df6cb434acf5f5c8daea05ec965338ab71113f3d162d51d9e0a303e2d57c251c8324f3e16158bd60d55f04436aa20bbc79f417f133caf4

  • SSDEEP

    12288:mFnmEQb6xK6EOcEELeBdUDBBe6pLtzPhGHUaRa:knmj6xK1y3Ik6TZGRa

Malware Config

Extracted

Family

icedid

Campaign

3467965077

C2

firenicatrible.com

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Icedid family
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c9127afe8f957f91a0f51025537fbcc23c2a6347c76e5f23a070985253aac0b5.dll
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1336

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1336-0-0x0000000000DD0000-0x0000000000DDE000-memory.dmp

    Filesize

    56KB

  • memory/1336-1-0x0000000000DD0000-0x0000000000DDE000-memory.dmp

    Filesize

    56KB