Analysis

  • max time kernel
    95s
  • max time network
    39s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2024 11:50

General

  • Target

    JaffaCakes118_412260ba866b5d20c36532eb88deb49e15d340d440936b65014ff66be857b0bc.dll

  • Size

    490KB

  • MD5

    edfba1106d5fa9f47c079c3202ad7cb4

  • SHA1

    4cfebd68b7a5ceef1f2bbf45013497a5bfcbd487

  • SHA256

    412260ba866b5d20c36532eb88deb49e15d340d440936b65014ff66be857b0bc

  • SHA512

    92949e9d42e673bc487afc2093405f0a1d5213d007cf1b102d4626e8af284e9a8fa802c1d8141ebe4f72c56bbc0396972d0bae367b6da5d89cf1d4fb0e36501e

  • SSDEEP

    12288:mFnmEQb6xK6EOcEELeBdUDBBe6pLtzPhGHUaRw:knmj6xK1y3Ik6TZGRw

Malware Config

Extracted

Family

icedid

Campaign

3467965077

C2

firenicatrible.com

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Icedid family
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_412260ba866b5d20c36532eb88deb49e15d340d440936b65014ff66be857b0bc.dll
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2376

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2376-0-0x0000000000150000-0x000000000015E000-memory.dmp

    Filesize

    56KB

  • memory/2376-1-0x0000000000150000-0x000000000015E000-memory.dmp

    Filesize

    56KB