Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2024, 02:32

General

  • Target

    JaffaCakes118_d43b1329f7485a2123e25ccf5e35a9415b9f08fa80fc61b47f81665e59e53dfb.dll

  • Size

    490KB

  • MD5

    3c94ff0fe3ae1f439b27b7c5c3990f39

  • SHA1

    42a95f406de60e48aa7ef478c21f782e63bc1bf3

  • SHA256

    d43b1329f7485a2123e25ccf5e35a9415b9f08fa80fc61b47f81665e59e53dfb

  • SHA512

    2a4f897a20cf65a32e1e7ff2690877ce7c93a4b001ea08146c77cba3f8c4c80a25722f6804fab785be1ab39eb5361660a3f1e968b70eade83e9f0bbd616da3ec

  • SSDEEP

    12288:mFnmEQb6xK6EOcEELeBdUDBBe6pLtzPhGHUaR0r:knmj6xK1y3Ik6TZGRq

Malware Config

Extracted

Family

icedid

Campaign

3467965077

C2

firenicatrible.com

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Icedid family
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d43b1329f7485a2123e25ccf5e35a9415b9f08fa80fc61b47f81665e59e53dfb.dll
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1412

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1412-0-0x00000000011F0000-0x00000000011FE000-memory.dmp

    Filesize

    56KB

  • memory/1412-1-0x00000000011F0000-0x00000000011FE000-memory.dmp

    Filesize

    56KB