Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2024 13:21

General

  • Target

    afb81317dd6442e5f305393674182025.dll

  • Size

    154KB

  • MD5

    afb81317dd6442e5f305393674182025

  • SHA1

    24cc7603424e154d8a6b38f37464c4a584220ced

  • SHA256

    1f2358aa55626a734911da01bddc40059eb398eb468744d0ba9174468f57cb07

  • SHA512

    fb3bd59bf53e30ad9c479ddffe5cad4ee77a5725af19f012a29a14ae3911818a27cfd7038fb3be2e7524fe4111bb9ba5c67144e5f76268c8bc263171b334a647

  • SSDEEP

    1536:Dvf1BPhZCGp+AK4zLl9E1Y3wvaowg6Sla6JwLfyUTuUgylQ3JBx6Ro:DvfnuGp+AK4zLl9E1Y3wvam7Ug1BV

Malware Config

Extracted

Family

icedid

Campaign

2292720537

C2

klicjop9.fun

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Icedid family
  • IcedID First Stage Loader 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\afb81317dd6442e5f305393674182025.dll
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:968

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/968-1-0x00000000028F0000-0x00000000028F7000-memory.dmp

    Filesize

    28KB