Analysis

  • max time kernel
    141s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2024, 01:42

General

  • Target

    JaffaCakes118_5558a297351c0c1ef739ddaa8a03c041500a1c2b712c09155adfba7fa1af8c4b.dll

  • Size

    490KB

  • MD5

    a3f7d7438f2c658e5edb3ec8d5415ae6

  • SHA1

    82be52476ad1a7fb097ac141c9e806dc50568199

  • SHA256

    5558a297351c0c1ef739ddaa8a03c041500a1c2b712c09155adfba7fa1af8c4b

  • SHA512

    ed489a4cd685fdbbd651b6c90e1c4f5a6473e71ed97365d75d3d4557500ba9e41a21f4a9d935759e47a49af0a22d5fcad85e5bcf2203375c59cf7234692fc80e

  • SSDEEP

    12288:mFnmEQb6xK6EOcEELeBdUDBBe6pLtzPhGHUaRE:knmj6xK1y3Ik6TZGRE

Malware Config

Extracted

Family

icedid

Campaign

3467965077

C2

firenicatrible.com

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Icedid family
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5558a297351c0c1ef739ddaa8a03c041500a1c2b712c09155adfba7fa1af8c4b.dll
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2128

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2128-0-0x00000000002F0000-0x00000000002FE000-memory.dmp

    Filesize

    56KB

  • memory/2128-1-0x00000000002F0000-0x00000000002FE000-memory.dmp

    Filesize

    56KB