Analysis

  • max time kernel
    99s
  • max time network
    99s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    12-11-2020 00:12

General

  • Target

    VSMecyU.dll

  • Size

    131KB

  • MD5

    4f807ffbf0704b3aaf708a1aef892dfd

  • SHA1

    55fb9e7df549ca9133dd2d481930e1042a8c61bc

  • SHA256

    4d00dd3d606e59496069e836b1c4466d5a11a1a03c2207947f64e4442099657a

  • SHA512

    8e7cf9306b690dd5afb762788dbfc88f8e7a54ecc1880c7e1cd80e358b22f2a3624173efd6f2a7c4ce510906876cc639eb261986abb7186365ee038be464a4dc

Malware Config

Extracted

Family

icedid

Campaign

3765533603

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Blocklisted process makes network request 7 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\VSMecyU.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1924
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\VSMecyU.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      PID:1344

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1344-0-0x0000000000000000-mapping.dmp