Analysis

  • max time kernel
    119s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220310-en
  • submitted
    21-03-2022 21:31

General

  • Target

    dart.dll

  • Size

    149KB

  • MD5

    5a10673301a00d36c56e189d0ff3b6a5

  • SHA1

    c90c05bc0413134e026038b9f55e3119de15e215

  • SHA256

    0ecca89b428fe89c9af8a661a71c8e5eab9873d76ff5b4191fbd94100d0e05bc

  • SHA512

    aa56193f93bd43e78a2af187c4458e92fc05c953d1e2e39a5576b577d1ae3fd1c4993c39b95956162f2f05badda61a9ed06c92abb0a6c3c214e1bcb97c03c23e

Malware Config

Extracted

Family

icedid

Campaign

3546287305

C2

oceriesfornot.top

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • suricata: ET MALWARE Win32/IcedID Request Cookie

    suricata: ET MALWARE Win32/IcedID Request Cookie

  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 62 IoCs
  • Modifies data under HKEY_USERS 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\dart.dll
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:3096
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p
    1⤵
    • Drops file in System32 directory
    PID:3380
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
    1⤵
    • Modifies data under HKEY_USERS
    PID:4276
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
    1⤵
    • Drops file in Windows directory
    PID:3968

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3096-134-0x0000000180000000-0x000000018000B000-memory.dmp

    Filesize

    44KB

  • memory/3968-140-0x000001B4917A0000-0x000001B4917B0000-memory.dmp

    Filesize

    64KB

  • memory/3968-141-0x000001B492170000-0x000001B492180000-memory.dmp

    Filesize

    64KB

  • memory/3968-142-0x000001B494720000-0x000001B494724000-memory.dmp

    Filesize

    16KB

  • memory/3968-143-0x000001B494A80000-0x000001B494A84000-memory.dmp

    Filesize

    16KB

  • memory/3968-144-0x000001B494A80000-0x000001B494A84000-memory.dmp

    Filesize

    16KB

  • memory/3968-145-0x000001B494AA0000-0x000001B494AA4000-memory.dmp

    Filesize

    16KB

  • memory/3968-146-0x000001B494A90000-0x000001B494A91000-memory.dmp

    Filesize

    4KB

  • memory/3968-147-0x000001B494B80000-0x000001B494B84000-memory.dmp

    Filesize

    16KB

  • memory/3968-148-0x000001B494B80000-0x000001B494B84000-memory.dmp

    Filesize

    16KB

  • memory/3968-149-0x000001B494C10000-0x000001B494C14000-memory.dmp

    Filesize

    16KB

  • memory/3968-150-0x000001B494B40000-0x000001B494B44000-memory.dmp

    Filesize

    16KB