Analysis

  • max time kernel
    121s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-12-2024 19:31

General

  • Target

    1e603b5dc665ad8d5b776b41eb986aa5198526e6e2ab1bf87c0cdcfc8cdc8393.dll

  • Size

    226KB

  • MD5

    cf2a3fb076436ae9ebfbd2538ee91fcd

  • SHA1

    1d4c6a2f5bd4c04334298526c8a15f4e3c326c76

  • SHA256

    1e603b5dc665ad8d5b776b41eb986aa5198526e6e2ab1bf87c0cdcfc8cdc8393

  • SHA512

    334c3ceb2e6b72a2720cfb99b8e07e28c114c5297a67236f317e6dcd0840327e4e127fa80163a4e3eb0254d209dd29039da0ff655c6e87bb52f17422b936a84e

  • SSDEEP

    6144:LbG2zudGcUvOSYQqtlyh6aN6RJ7MQH6+kbgUG0DrUOs2J:LRzuMcUvOSYQqtlyh6aN6RJ7MQH6+DUv

Malware Config

Extracted

Family

icedid

Campaign

1386562008

C2

zasertiokil.top

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Icedid family
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\1e603b5dc665ad8d5b776b41eb986aa5198526e6e2ab1bf87c0cdcfc8cdc8393.dll
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:3272

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3272-0-0x0000000000840000-0x0000000000886000-memory.dmp

    Filesize

    280KB