Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    23/12/2024, 23:28

General

  • Target

    JaffaCakes118_ac43418dd37ede00f9324605bae8fd96e90386ba4f7bad2657bbf874a33c4500.dll

  • Size

    490KB

  • MD5

    20bac40f4bc3d76b7da93600f50503a0

  • SHA1

    c4b6561413f7c2c56c6be1f55b6241d476081035

  • SHA256

    ac43418dd37ede00f9324605bae8fd96e90386ba4f7bad2657bbf874a33c4500

  • SHA512

    67370554a5d726fcd8719ce44b37df19748a190fc358d92a85ddf626c3e94cefdba51ed2326e150f66cadd32e2a14ad86417870e8d3c594cfebe3532ad352338

  • SSDEEP

    12288:mFnmEQb6xK6EOcEELeBdUDBBe6pLtzPhGHUaRc:knmj6xK1y3Ik6TZGRc

Malware Config

Extracted

Family

icedid

Campaign

3467965077

C2

firenicatrible.com

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Icedid family
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ac43418dd37ede00f9324605bae8fd96e90386ba4f7bad2657bbf874a33c4500.dll
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1064

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1064-0-0x00000000002C0000-0x00000000002CE000-memory.dmp

    Filesize

    56KB

  • memory/1064-1-0x00000000002C0000-0x00000000002CE000-memory.dmp

    Filesize

    56KB