Analysis

  • max time kernel
    141s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23-12-2024 18:58

General

  • Target

    JaffaCakes118_ff921eb165a5c4099fa6f1d6d49dd0d967f74c29437dcbfd06d7f03f6a4d9132.dll

  • Size

    490KB

  • MD5

    0fab5b924951675aeba9b0911ae7ce94

  • SHA1

    5fbffa62c2f1f034588fae9862abd5cba829c021

  • SHA256

    ff921eb165a5c4099fa6f1d6d49dd0d967f74c29437dcbfd06d7f03f6a4d9132

  • SHA512

    dbd09ed86182cd6763b6d54df3d58fef807852654241a851b1518ac2ac3666334c80f651079d5b9ec2606e4d5d871dc96338cbac70adcae3a07d906bbd21beef

  • SSDEEP

    12288:mFnmEQb6xK6EOcEELeBdUDBBe6pLtzPhGHUaRb:knmj6xK1y3Ik6TZGRb

Malware Config

Extracted

Family

icedid

Campaign

3467965077

C2

firenicatrible.com

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Icedid family
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ff921eb165a5c4099fa6f1d6d49dd0d967f74c29437dcbfd06d7f03f6a4d9132.dll
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2300

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2300-0-0x00000000003F0000-0x00000000003FE000-memory.dmp

    Filesize

    56KB

  • memory/2300-1-0x00000000003F0000-0x00000000003FE000-memory.dmp

    Filesize

    56KB