Analysis

  • max time kernel
    126s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2022 13:52

General

  • Target

    moment_teach/loader_dll_64_3#001.dll15.dll

  • Size

    60KB

  • MD5

    71ee6437db507ca360a6d1017a9aa9d7

  • SHA1

    622efe9510f9863b3bbd2ef8d25cf683976ade21

  • SHA256

    962c901ef22e780ee67c5482318668ca107449e093033c069dbe2df093a6ccf2

  • SHA512

    f4e72fe5b40fc050008e2cb5eb7626973530f822da0802fd2af49f1fc9ebb952e8756f539ee32e4b9a66c3a0cf34ea93807d322a8e3da01ad00460adc2bd5f58

  • SSDEEP

    768:lUtBgKpGoGIs9LiS19/RyeGlvV0hZZL4C5A0ctAcHPfYg5:lUbgsNk9pTs64aA0cPHYU

Malware Config

Extracted

Family

icedid

Campaign

1575907940

C2

autovropsanti.com

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Blocklisted process makes network request 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\moment_teach\loader_dll_64_3#001.dll15.dll,#1
    1⤵
    • Blocklisted process makes network request
    • Suspicious behavior: EnumeratesProcesses
    PID:968

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/968-54-0x0000000180000000-0x000000018001C000-memory.dmp
    Filesize

    112KB

  • memory/968-55-0x00000000001A0000-0x00000000001A7000-memory.dmp
    Filesize

    28KB