Analysis

  • max time kernel
    93s
  • max time network
    37s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2024 09:11

General

  • Target

    JaffaCakes118_d2b2fae58d594e50079079483a17b7c20369cff864c8ed8575c65186ddca65d2.dll

  • Size

    490KB

  • MD5

    d4e7e0e9ee5d9064cff44acefb7e3607

  • SHA1

    95e5dcac8d427a306f8d145439561a0099035f3a

  • SHA256

    d2b2fae58d594e50079079483a17b7c20369cff864c8ed8575c65186ddca65d2

  • SHA512

    1021bece8f591a10dddb1503682f594d81dff67926e24ff5a88a1e18a08ed2f297069efb85518d808d3c196479c14acecd7212a7f25cd571365dab691fb14dbd

  • SSDEEP

    12288:mFnmEQb6xK6EOcEELeBdUDBBe6pLtzPhGHUaRo:knmj6xK1y3Ik6TZGRo

Malware Config

Extracted

Family

icedid

Campaign

3467965077

C2

firenicatrible.com

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Icedid family
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d2b2fae58d594e50079079483a17b7c20369cff864c8ed8575c65186ddca65d2.dll
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2244

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2244-0-0x00000000002D0000-0x00000000002DE000-memory.dmp

    Filesize

    56KB

  • memory/2244-1-0x00000000002D0000-0x00000000002DE000-memory.dmp

    Filesize

    56KB