Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
29-10-2020 14:05
Static task
static1
Behavioral task
behavioral1
Sample
ebe23f49.jpg.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
ebe23f49.jpg.dll
-
Size
130KB
-
MD5
307baee7a6a0611d7fe8e0100f0c5004
-
SHA1
df4454ee7b9bfe9cd139838b16b97e044b6ed0cb
-
SHA256
8d4a19f6f6bea669bd04e5934f483d03a538dccc070a05269a8375315ae01562
-
SHA512
9805d17c899c72a58217ed7fa84953f35e5a59f20d2f315c1583b4fe4c9bcde5b71e293c3e64a307686c290ad033182a616a759e7fd23c200f19e9e536d1a7e8
Malware Config
Extracted
Family
icedid
C2
stryjerefer.buzz
Signatures
-
IcedID First Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1404-1-0x0000000002DE0000-0x0000000002DE8000-memory.dmp IcedidFirstLoader behavioral2/memory/1404-2-0x0000000002DF0000-0x0000000002DF6000-memory.dmp IcedidFirstLoader -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid Process procid_target PID 656 wrote to memory of 1404 656 regsvr32.exe 70 PID 656 wrote to memory of 1404 656 regsvr32.exe 70 PID 656 wrote to memory of 1404 656 regsvr32.exe 70