Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-12-2024 14:23

General

  • Target

    JaffaCakes118_5f96d69888340a9f33687098e2c4354a31ea2b839d113c18b6a6049619e2bd1c.dll

  • Size

    490KB

  • MD5

    ec0d43f0a484bda15de025d59aa55e05

  • SHA1

    df2c8350bc61b4b5893e5754dd5a6e3edbc60a24

  • SHA256

    5f96d69888340a9f33687098e2c4354a31ea2b839d113c18b6a6049619e2bd1c

  • SHA512

    c762b595edeb1d3524c499ad37dc8e266506a16dc1e10480fa3d6c14c807fa21ebcb43a3676e26a804d68f49542d38ff63ecbb45d4f7926de385f53f196f1aae

  • SSDEEP

    12288:mFnmEQb6xK6EOcEELeBdUDBBe6pLtzPhGHUaRFq:knmj6xK1y3Ik6TZGRFq

Malware Config

Extracted

Family

icedid

Campaign

3467965077

C2

firenicatrible.com

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Icedid family
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5f96d69888340a9f33687098e2c4354a31ea2b839d113c18b6a6049619e2bd1c.dll
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2204

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2204-0-0x00000000020E0000-0x00000000020EE000-memory.dmp

    Filesize

    56KB

  • memory/2204-1-0x00000000020E0000-0x00000000020EE000-memory.dmp

    Filesize

    56KB