Analysis

  • max time kernel
    150s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    18-06-2024 15:46

General

  • Target

    bcbc51e4a4a1e2d2a8c558171c8192e9_JaffaCakes118.exe

  • Size

    100KB

  • MD5

    bcbc51e4a4a1e2d2a8c558171c8192e9

  • SHA1

    c2e170d8fd0ff68d7152892a8d5bac588ef4cc36

  • SHA256

    79723cbc2234e26aae3111b8c7b6711da68a46d01e5808598a1492e49c331f60

  • SHA512

    c1effc00aa2318891cfc289795d4cea6803e462102d3ed0636e0e0ac7396562853ca6a7fef478fd7b4f7c89a72b2ebb6ff0c4988ed7479e517202d2ed849f5ed

  • SSDEEP

    3072:dx0NBB7ts75yPAa3VVPHNRbtsBUsssss:dikdyPAalVV

Malware Config

Extracted

Family

icedid

Botnet

491699037

C2

exceptionalsanta.pro

happysantacows.red

mexicanfoodinmiami.pro

malayanfoodinmiami.pro

Attributes
  • auth_var

    1

  • url_path

    /index.php

Extracted

Family

icedid

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • IcedID Second Stage Loader 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bcbc51e4a4a1e2d2a8c558171c8192e9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bcbc51e4a4a1e2d2a8c558171c8192e9_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1704

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1704-0-0x00000000002C0000-0x00000000002C1000-memory.dmp
    Filesize

    4KB

  • memory/1704-1-0x00000000002E0000-0x00000000002E5000-memory.dmp
    Filesize

    20KB

  • memory/1704-5-0x00000000002D0000-0x00000000002D2000-memory.dmp
    Filesize

    8KB