Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-12-2024 14:57

General

  • Target

    JaffaCakes118_64494d972c6cc83f05a90df12b2416fae68283cfc3f7a707ff0d99f47c7a8e78.dll

  • Size

    490KB

  • MD5

    d83ad735f88537b18647127b5c3cda8b

  • SHA1

    d149e8510989b076b497112f27e22ff1d3c797dd

  • SHA256

    64494d972c6cc83f05a90df12b2416fae68283cfc3f7a707ff0d99f47c7a8e78

  • SHA512

    3b6880160f1adfee84f2871ada6282c4978efd8601907a40140e7ea0242575115b8904b5d35b09d1e4e363990471f1f753570efe3e84593ceb7c26a0d23e774d

  • SSDEEP

    12288:mFnmEQb6xK6EOcEELeBdUDBBe6pLtzPhGHUaRp:knmj6xK1y3Ik6TZGRp

Malware Config

Extracted

Family

icedid

Campaign

3467965077

C2

firenicatrible.com

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Icedid family
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_64494d972c6cc83f05a90df12b2416fae68283cfc3f7a707ff0d99f47c7a8e78.dll
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1808

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1808-0-0x00000000020A0000-0x00000000020AE000-memory.dmp

    Filesize

    56KB

  • memory/1808-1-0x00000000020A0000-0x00000000020AE000-memory.dmp

    Filesize

    56KB