Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2024 18:21

General

  • Target

    JaffaCakes118_f7240f23e3a0516d0a41c8100e11f702d8c63fcde53990bf54812b2eee51b25d.dll

  • Size

    43KB

  • MD5

    50d8f2794d107e5c627c9391f0420ce3

  • SHA1

    7f4a79518a3359d4456764404e803615fecfde8f

  • SHA256

    f7240f23e3a0516d0a41c8100e11f702d8c63fcde53990bf54812b2eee51b25d

  • SHA512

    ea7b59c63b967e817506da4eb4697adb042f3e1968e72f3a1407c207a9873ea86461c114198bb6a84c502de6a3f8292996088db687e3ea80f61c396273d171db

  • SSDEEP

    768:PZ0JYAgQQdfuTt8FrmZkPdmeJwtB7xEgMRFtCiOc7aHVmNrrPUJ:cYA/Cfvd1CtB4sc4J

Malware Config

Extracted

Family

icedid

Campaign

2843686224

C2

fivetonnbobavia.uno

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Icedid family
  • IcedID First Stage Loader 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f7240f23e3a0516d0a41c8100e11f702d8c63fcde53990bf54812b2eee51b25d.dll
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2344

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2344-0-0x00000000003D0000-0x00000000003D7000-memory.dmp

    Filesize

    28KB

  • memory/2344-1-0x00000000003D0000-0x00000000003D7000-memory.dmp

    Filesize

    28KB