Analysis

  • max time kernel
    12s
  • max time network
    112s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    01-04-2021 16:20

General

  • Target

    0696ce4d1073d56993acf108816e8f6d4cadc0803fc24.dll

  • Size

    198KB

  • MD5

    b40478c9837b46e0c7c58ed6e2b287a0

  • SHA1

    641f010814fecc35133e5d4e679822fed619174d

  • SHA256

    0696ce4d1073d56993acf108816e8f6d4cadc0803fc24a1ede47569faeb1ed80

  • SHA512

    f688172e3e31379a6b45c8b209923738972714db6b7bf907470261f39ad6f0274f6636f029e5e3d5fd454234d27990efb4e5365bd5fc3851dea7d01f27f5d720

Malware Config

Extracted

Family

icedid

Campaign

1584008337

C2

secondpilots.space

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • IcedID First Stage Loader 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\0696ce4d1073d56993acf108816e8f6d4cadc0803fc24.dll
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:4012

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4012-2-0x0000000000C50000-0x0000000000C57000-memory.dmp
    Filesize

    28KB