Analysis

  • max time kernel
    4s
  • max time network
    11s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    07-05-2021 15:04

General

  • Target

    011bc15db92fe83fcbb0904253ef539e88a54d6e6ccef.dll

  • Size

    231KB

  • MD5

    f4cedc272682f9a9a258a7b9ce5ac794

  • SHA1

    e9b9abfca35af5d041ec733fb88f47c3e5b26bad

  • SHA256

    011bc15db92fe83fcbb0904253ef539e88a54d6e6ccef8bbf2d7c5e81413c876

  • SHA512

    d285b3cfebcda36895f0ff6cf5a198f8ad87dab9832ad1dc3ad5e81dcc5072d5f5eed81088f55662b1f3ae5f8ae20509eaa72dc9d96c71294b8c7f16e6afdf27

Malware Config

Extracted

Family

icedid

Campaign

1640767800

C2

jikkiaderwa.top

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\011bc15db92fe83fcbb0904253ef539e88a54d6e6ccef.dll
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1996

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1996-60-0x000007FEFC051000-0x000007FEFC053000-memory.dmp
    Filesize

    8KB

  • memory/1996-61-0x00000000001B0000-0x00000000001F6000-memory.dmp
    Filesize

    280KB