Analysis

  • max time kernel
    132s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    05-05-2021 13:31

General

  • Target

    d0e1699bf9ee9e7eaf123df5fac98aeed2d3e104f939bf5e74c61ad18b79a940.dll

  • Size

    46KB

  • MD5

    844922394b66b46bda4d4be6d352fc84

  • SHA1

    7cc05e2ef77e2ae26c80202a039aac1d78a3e4a1

  • SHA256

    d0e1699bf9ee9e7eaf123df5fac98aeed2d3e104f939bf5e74c61ad18b79a940

  • SHA512

    d3ed612964f85dbb447a58a96f414c3f6404a3bf034b34b8e91eb33ed9867acdf1cd1ed19bf0e879273e692f25a79eb5e3d71a1705cca5cb30273c181f2f9797

Malware Config

Extracted

Family

icedid

Campaign

3717128962

C2

usaaforced.fun

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • IcedID First Stage Loader 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\d0e1699bf9ee9e7eaf123df5fac98aeed2d3e104f939bf5e74c61ad18b79a940.dll
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1996

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1996-60-0x000007FEFC051000-0x000007FEFC053000-memory.dmp
    Filesize

    8KB

  • memory/1996-61-0x00000000002B0000-0x00000000002B7000-memory.dmp
    Filesize

    28KB