Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2024 13:02

General

  • Target

    core/cmd.bat

  • Size

    193B

  • MD5

    3a381435fb992cd5ae34c6e84ea6d409

  • SHA1

    941e0ee20e5c1fef2f76833d3b060491da17bef0

  • SHA256

    4373f87735a69af9812956a8821a3fccac5aa3a6cd0a832973b03da9573a787a

  • SHA512

    ba4e0c6fcb543978542294084442a0fe964ec0f093e68814548bcfa93447d82d8a7f232c232380ea051289f81173da0876dee640deafa7bdc83ced2ac02aacfa

Malware Config

Extracted

Family

icedid

Botnet

1217670233

C2

nnelforwfin.top

lakogrefop.rest

hangetilin.top

essaipienure.space

Attributes
  • auth_var

    6

  • url_path

    /posts/

Extracted

Family

icedid

rsa_pubkey.plain

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Icedid family
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\core\cmd.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1556
    • C:\Windows\system32\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\core\asthma-x64.tmp,DllMain --ma="license.dat"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:3152

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\license.dat

    Filesize

    333KB

    MD5

    b03af34cc11c8bd53afd958c839dd59f

    SHA1

    d9c90d8f770be66850ea0734580867c16d64b404

    SHA256

    71c9c15896b027fd830423f6226587bdad3f09681799bf3e69abb0479f18a853

    SHA512

    c33204f04a99272a1619a4fe6e3ba5e128c437968f8f570c12ffbf20a71e2b617535a70bf51f9d4ddcccc7f44804a13a4528ece4470e4ee53273ad1806313911

  • memory/3152-2-0x000001487ABE0000-0x000001487AC17000-memory.dmp

    Filesize

    220KB

  • memory/3152-5-0x000001487C520000-0x000001487C578000-memory.dmp

    Filesize

    352KB

  • memory/3152-11-0x000001487C520000-0x000001487C578000-memory.dmp

    Filesize

    352KB

  • memory/3152-12-0x000001487C520000-0x000001487C578000-memory.dmp

    Filesize

    352KB