Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    15-04-2022 13:27

General

  • Target

    9887b7831c3ce6c97317e392aba71bfefef54d8c5860d84bc584ad4661f2f757.exe

  • Size

    396KB

  • MD5

    525871dae984d1b056647e4f5cfc11fe

  • SHA1

    d209ba0ead3450c566a02f8f72b5777ac97540a9

  • SHA256

    9887b7831c3ce6c97317e392aba71bfefef54d8c5860d84bc584ad4661f2f757

  • SHA512

    c4a5b6c5d073e27450553b58b95b97f23b943bc2beefc8a0d9ff9ffdb8fe1eacaeb57cc3e7b605b78e482f4b224779fde5f291c0ec12c274c229499648e3f391

Malware Config

Extracted

Family

icedid

C2

loadfreeman.casa

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • IcedID First Stage Loader 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9887b7831c3ce6c97317e392aba71bfefef54d8c5860d84bc584ad4661f2f757.exe
    "C:\Users\Admin\AppData\Local\Temp\9887b7831c3ce6c97317e392aba71bfefef54d8c5860d84bc584ad4661f2f757.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4436

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4436-130-0x00000000005F0000-0x00000000005F6000-memory.dmp
    Filesize

    24KB

  • memory/4436-133-0x00000000005E0000-0x00000000005E3000-memory.dmp
    Filesize

    12KB