Resubmissions

08-02-2022 15:50

220208-s9ye9saaf5 10

08-02-2022 14:47

220208-r5vyxahcbn 10

Analysis

  • max time kernel
    147s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    08-02-2022 14:47

General

  • Target

    1909a177d8f646c0993e5e58347e1a0b39b71dc45ad4ae49faa631683c18a3e6.dll

  • Size

    615KB

  • MD5

    3bfef2a13f7cbbe2c872bef76adb676b

  • SHA1

    dd972d20477223b75ffddf0b2e65b533a431aa14

  • SHA256

    1909a177d8f646c0993e5e58347e1a0b39b71dc45ad4ae49faa631683c18a3e6

  • SHA512

    5ef53f6cc283f38212c4818576bcaaee80518fc383639b4051e498778f60e1751be09c2738b4e8b9a21620a047e5e916e4effd7f48d1035779b35d9ae1a1e543

Malware Config

Extracted

Family

icedid

Campaign

1732687004

C2

keepfootbal.com

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • suricata: ET MALWARE Win32/IcedID Request Cookie

    suricata: ET MALWARE Win32/IcedID Request Cookie

  • Drops file in Windows directory 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 47 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\1909a177d8f646c0993e5e58347e1a0b39b71dc45ad4ae49faa631683c18a3e6.dll
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:3704
  • C:\Windows\system32\MusNotifyIcon.exe
    %systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13
    1⤵
    • Checks processor information in registry
    PID:3144
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -p
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    PID:3768

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3704-130-0x00000000009A0000-0x00000000009AA000-memory.dmp

    Filesize

    40KB