Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
24-03-2021 17:45
Static task
static1
Behavioral task
behavioral1
Sample
17752d872e9ca1c8b6d7a995225af92e2a3842a50b0d635964da2c8d9d951dc4.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
17752d872e9ca1c8b6d7a995225af92e2a3842a50b0d635964da2c8d9d951dc4.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
17752d872e9ca1c8b6d7a995225af92e2a3842a50b0d635964da2c8d9d951dc4.dll
-
Size
65KB
-
MD5
16d0992b8c4ecf804e23a376ef2d4d7f
-
SHA1
3aa63b7d0bc6f90a78a43ffc92aa373a2fd96a78
-
SHA256
17752d872e9ca1c8b6d7a995225af92e2a3842a50b0d635964da2c8d9d951dc4
-
SHA512
4c7aa33ab34228024aa19c2a367f1f65174e558c578868c5bade54bdc45e188f3a89b1770a5da2328d9294570a98c6f87b1e0c8ed6988d26fa0ed1cea5651947
Score
10/10
Malware Config
Extracted
Family
icedid
Campaign
3683573724
C2
24savetonnofmaoney.xyz
Signatures
-
IcedID First Stage Loader 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1848-3-0x0000000000140000-0x0000000000147000-memory.dmp IcedidFirstLoader -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 1848 regsvr32.exe 1848 regsvr32.exe