Analysis

  • max time kernel
    101s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-08-2024 01:47

General

  • Target

    5d33b73e4e2c730b4d0cce23ece2c120N.dll

  • Size

    454KB

  • MD5

    5d33b73e4e2c730b4d0cce23ece2c120

  • SHA1

    9f56233865008afde7b59f01aa9dcc25a9b5260f

  • SHA256

    2ec081a000189d3b3546949fa0bbe08914c651f69265c3b57ddf7c03b296f249

  • SHA512

    b5b1aa0bc79c967574b9ee3b5e394a31dc4db65ce8a1ea8d8b0deb86478ef41674d2674215372258be4a47a9e1fd86105cfba1015b1fcb85f91539156a5a211a

  • SSDEEP

    6144:UnBSboezY580J0f7wOnhulNrr5P1rh/KCeO9mHT2gjn3V1Afgsd1/T7FWQ+I7BFB:+aoeT0lwCeOA3rYgoVZ

Malware Config

Extracted

Family

icedid

Campaign

512092511

C2

alkaliodplus.com

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\5d33b73e4e2c730b4d0cce23ece2c120N.dll,#1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:4784

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4784-0-0x000001D35AE20000-0x000001D35AE26000-memory.dmp

    Filesize

    24KB

  • memory/4784-1-0x000001D35AE30000-0x000001D35AE39000-memory.dmp

    Filesize

    36KB