Analysis

  • max time kernel
    119s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2022 07:00

General

  • Target

    pettish.db.dll

  • Size

    452KB

  • MD5

    6b4713395b6b24fa138b6395b065dcf1

  • SHA1

    56d4dcc17730c3401fbb747f8e4eaec230e0b87a

  • SHA256

    052541f7dba593fcf623cf09898e035a2bd94d130e0677478e3bf64b60563928

  • SHA512

    0dc39329b7fa050ae5be22eca70b108e6bdf8db74f401f92d68ecb9d8d05c54158f9d2820ca58f1d0725997f556715b9164b757fc53ba0ef1d8d748b4f096074

  • SSDEEP

    3072:9pzQiAIOvJ+0vh1AKhgF9y6j613scqoFCrqJOuAn+CBnL56ZCoOt9Fy1TPp3BwIg:9px0vT9y1YsVoF/JOuA++L56ZdLVBtVi

Malware Config

Extracted

Family

icedid

Campaign

2349072319

C2

sebdgoldingor.com

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Blocklisted process makes network request 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\pettish.db.dll,#1
    1⤵
    • Blocklisted process makes network request
    • Suspicious behavior: EnumeratesProcesses
    PID:1708

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1708-54-0x0000000180000000-0x0000000180009000-memory.dmp
    Filesize

    36KB

  • memory/1708-60-0x0000000000390000-0x0000000000396000-memory.dmp
    Filesize

    24KB