Analysis

  • max time kernel
    141s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2024 18:21

General

  • Target

    JaffaCakes118_8626aabe97c2564fd10beb8d45390434fe9df05c6986aa1c9f97030a46bce816.dll

  • Size

    490KB

  • MD5

    dac419dffc8e6f1658b2a484c61d1d74

  • SHA1

    10fe07cc49aa12153438bbaadb0be49050ab814f

  • SHA256

    8626aabe97c2564fd10beb8d45390434fe9df05c6986aa1c9f97030a46bce816

  • SHA512

    ca1d6910b834f7104fa570344b70ff4ee9762d2ac5aca9b5a2f0d211a9d7cd718bd1a403ad9ae3c07c0aff34cafe55f1b4c7a894ac787803feb02d40ca46ad69

  • SSDEEP

    12288:mFnmEQb6xK6EOcEELeBdUDBBe6pLtzPhGHUaRA:knmj6xK1y3Ik6TZGRA

Malware Config

Extracted

Family

icedid

Campaign

3467965077

C2

firenicatrible.com

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Icedid family
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8626aabe97c2564fd10beb8d45390434fe9df05c6986aa1c9f97030a46bce816.dll
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2000

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2000-0-0x0000000000170000-0x000000000017E000-memory.dmp

    Filesize

    56KB

  • memory/2000-1-0x0000000000170000-0x000000000017E000-memory.dmp

    Filesize

    56KB