Analysis

  • max time kernel
    143s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2023, 20:44

General

  • Target

    NEAS.d7e6bc7d9983adc4dd2820d00756c7c0.dll

  • Size

    328KB

  • MD5

    d7e6bc7d9983adc4dd2820d00756c7c0

  • SHA1

    15fa33e71a2c20f73bc4595546b1494ec2e561b0

  • SHA256

    f324bb47090d388fca1015260f66f67b708e8451292cd5679791792c90d5b711

  • SHA512

    42d534bd586e8ffec3ec170409667becec6206f97701497527ca1c8a35a6b251f6d9b24304d08b3460761abff6394446af11bed19c35a24affe9b165c50e7001

  • SSDEEP

    6144:fN/F41OWGRkFtwxW6spj/JbUaeboh6EReEUHFmU8D7KTXhdic:f5FCOWGRayW6sAowXFmU8D7KTRw

Malware Config

Extracted

Family

icedid

Campaign

361893872

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Blocklisted process makes network request 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\NEAS.d7e6bc7d9983adc4dd2820d00756c7c0.dll
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4032
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C rundll32.exe C:\Users\Admin\AppData\Roaming\Admin\toboilmc2\zexowaacac2.dll,#1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1484
      • C:\Windows\system32\rundll32.exe
        rundll32.exe C:\Users\Admin\AppData\Roaming\Admin\toboilmc2\zexowaacac2.dll,#1
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Modifies registry class
        PID:412

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Admin\toboilmc2\zexowaacac2.dll

    Filesize

    583KB

    MD5

    0245e02cbb6ffe2716c2aeb7fb8006d0

    SHA1

    59dd3d2477211eb4fcd72b542812a2036fa0e1e8

    SHA256

    5d5bc4f497406b59369901b9a79e1e9d1e0a690c0b2e803f4fbfcb391bcfeef1

    SHA512

    0c2e863512f2d83429e681cbcdb31bf9c6f0a69611f6d8923198d51d1e49750f4bf441c8ce256fb44a9cb39a6855e70fcbc644739926570214400bd06a683d82

  • C:\Users\Admin\AppData\Roaming\Admin\toboilmc2\zexowaacac2.dll

    Filesize

    583KB

    MD5

    0245e02cbb6ffe2716c2aeb7fb8006d0

    SHA1

    59dd3d2477211eb4fcd72b542812a2036fa0e1e8

    SHA256

    5d5bc4f497406b59369901b9a79e1e9d1e0a690c0b2e803f4fbfcb391bcfeef1

    SHA512

    0c2e863512f2d83429e681cbcdb31bf9c6f0a69611f6d8923198d51d1e49750f4bf441c8ce256fb44a9cb39a6855e70fcbc644739926570214400bd06a683d82

  • memory/412-8-0x000001D05BB60000-0x000001D05BBAC000-memory.dmp

    Filesize

    304KB

  • memory/412-7-0x000001D05BAC0000-0x000001D05BB0F000-memory.dmp

    Filesize

    316KB

  • memory/412-13-0x000001D05BB60000-0x000001D05BBAC000-memory.dmp

    Filesize

    304KB

  • memory/412-14-0x000001D05BB60000-0x000001D05BBAC000-memory.dmp

    Filesize

    304KB

  • memory/412-15-0x000001D05BAC0000-0x000001D05BB0F000-memory.dmp

    Filesize

    316KB

  • memory/412-20-0x000001D05BB60000-0x000001D05BBAC000-memory.dmp

    Filesize

    304KB

  • memory/412-21-0x000001D05BB60000-0x000001D05BBAC000-memory.dmp

    Filesize

    304KB

  • memory/412-23-0x000001D05BB60000-0x000001D05BBAC000-memory.dmp

    Filesize

    304KB

  • memory/4032-3-0x0000000002920000-0x000000000292D000-memory.dmp

    Filesize

    52KB

  • memory/4032-1-0x0000000002920000-0x000000000292D000-memory.dmp

    Filesize

    52KB

  • memory/4032-0-0x0000000002920000-0x000000000292D000-memory.dmp

    Filesize

    52KB