Analysis

  • max time kernel
    141s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2024 08:33

General

  • Target

    JaffaCakes118_8628fea1ab5fd930feb75593d621c8a84ee0464a26e7ec64511ffbd104511fec.dll

  • Size

    490KB

  • MD5

    12a854629509bf363f705346d0a643c3

  • SHA1

    c3b0e24d35c9d3c96c67747690d8ae26f1621f11

  • SHA256

    8628fea1ab5fd930feb75593d621c8a84ee0464a26e7ec64511ffbd104511fec

  • SHA512

    64f148d4f58780b3ae513d21d6d8d7b691cfa723cff5e10a489f6c61315e43116f6751fb9258044378d33c514e196df85dabb27553a997d12a2ae4d807306803

  • SSDEEP

    12288:mFnmEQb6xK6EOcEELeBdUDBBe6pLtzPhGHUaRU:knmj6xK1y3Ik6TZGRU

Malware Config

Extracted

Family

icedid

Campaign

3467965077

C2

firenicatrible.com

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Icedid family
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8628fea1ab5fd930feb75593d621c8a84ee0464a26e7ec64511ffbd104511fec.dll
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:5008

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5008-0-0x00000000015F0000-0x00000000015FE000-memory.dmp

    Filesize

    56KB

  • memory/5008-1-0x00000000015F0000-0x00000000015FE000-memory.dmp

    Filesize

    56KB