Analysis

  • max time kernel
    82s
  • max time network
    113s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    11-05-2021 10:36

General

  • Target

    011bc15db92fe83fcbb0904253ef539e88a54d6e6ccef8bbf2d7c5e81413c876.dll

  • Size

    231KB

  • MD5

    f4cedc272682f9a9a258a7b9ce5ac794

  • SHA1

    e9b9abfca35af5d041ec733fb88f47c3e5b26bad

  • SHA256

    011bc15db92fe83fcbb0904253ef539e88a54d6e6ccef8bbf2d7c5e81413c876

  • SHA512

    d285b3cfebcda36895f0ff6cf5a198f8ad87dab9832ad1dc3ad5e81dcc5072d5f5eed81088f55662b1f3ae5f8ae20509eaa72dc9d96c71294b8c7f16e6afdf27

Score
10/10

Malware Config

Extracted

Family

icedid

C2

jikkiaderwa.top

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\011bc15db92fe83fcbb0904253ef539e88a54d6e6ccef8bbf2d7c5e81413c876.dll
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:4060

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4060-114-0x0000000002B70000-0x0000000002BB6000-memory.dmp

    Filesize

    280KB