Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
24-03-2021 17:45
Static task
static1
Behavioral task
behavioral1
Sample
17752d872e9ca1c8b6d7a995225af92e2a3842a50b0d635964da2c8d9d951dc4.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
17752d872e9ca1c8b6d7a995225af92e2a3842a50b0d635964da2c8d9d951dc4.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
17752d872e9ca1c8b6d7a995225af92e2a3842a50b0d635964da2c8d9d951dc4.dll
-
Size
65KB
-
MD5
16d0992b8c4ecf804e23a376ef2d4d7f
-
SHA1
3aa63b7d0bc6f90a78a43ffc92aa373a2fd96a78
-
SHA256
17752d872e9ca1c8b6d7a995225af92e2a3842a50b0d635964da2c8d9d951dc4
-
SHA512
4c7aa33ab34228024aa19c2a367f1f65174e558c578868c5bade54bdc45e188f3a89b1770a5da2328d9294570a98c6f87b1e0c8ed6988d26fa0ed1cea5651947
Score
10/10
Malware Config
Extracted
Family
icedid
Campaign
3683573724
C2
24savetonnofmaoney.xyz
Signatures
-
IcedID First Stage Loader 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3576-2-0x0000000000ED0000-0x0000000000ED7000-memory.dmp IcedidFirstLoader -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 3576 regsvr32.exe 3576 regsvr32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3576-2-0x0000000000ED0000-0x0000000000ED7000-memory.dmpFilesize
28KB