Analysis

  • max time kernel
    62s
  • max time network
    56s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    17/07/2020, 07:29

General

  • Target

    IcedID.dll

  • Size

    204KB

  • MD5

    d966d5b7e8f66c536b2b8934e6231ba8

  • SHA1

    276b93b5a9a4d736ab00256f33fe3991bc772d8d

  • SHA256

    b97cc0d33b7a728206da8f7b3b46bdf383cab4999db18fb11bda86c4a16c6fa9

  • SHA512

    3bf18d07769fed0ddcc241a5b931b87c6a4429041ffcb9d524723a80589135ebbcbe0310af5a477de92a0fa6aab65f5be58d9c7ee67f555a04fdb6e009a013f3

Score
8/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • Blacklisted process makes network request 8 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\IcedID.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1100
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\IcedID.dll,#1
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Modifies system certificate store
      • Blacklisted process makes network request
      PID:1228

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads