Analysis

  • max time kernel
    40s
  • max time network
    43s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    05-07-2022 21:22

General

  • Target

    o5p0se.dll

  • Size

    673KB

  • MD5

    c59010fb2f9f2986c3830bc1e75e96f9

  • SHA1

    475efec12172022b28e1020b9227f30f956b13a6

  • SHA256

    352b7787103e0e735632fb70a89de041c3c4da7eb2194e5a5eafcc48f6096be4

  • SHA512

    1deff83a4989ec4c1856c34ff686d8828cb7f82f7b0b5b28647bec4696b4ea6242edbc6348163a23316dfc4c2d23ac999fe8bacfd058fd6a0060ea6075eb49a4

Malware Config

Extracted

Family

icedid

Campaign

1060798742

C2

carismorth.com

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • suricata: ET MALWARE Win32/IcedID Request Cookie

    suricata: ET MALWARE Win32/IcedID Request Cookie

  • Blocklisted process makes network request 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\o5p0se.dll,#1
    1⤵
    • Blocklisted process makes network request
    • Suspicious behavior: EnumeratesProcesses
    PID:948

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/948-54-0x0000000180000000-0x0000000180009000-memory.dmp

    Filesize

    36KB