Analysis
-
max time kernel
34s -
max time network
35s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
24-03-2021 20:27
Static task
static1
Behavioral task
behavioral1
Sample
e12edc89dd5c4026d176887872c6dfd8.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
e12edc89dd5c4026d176887872c6dfd8.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
e12edc89dd5c4026d176887872c6dfd8.dll
-
Size
52KB
-
MD5
e12edc89dd5c4026d176887872c6dfd8
-
SHA1
22cb0fc4cc43deba7b541c244ff880dd10c86b72
-
SHA256
56a6c5b5a624e1787b9f5242055e808602e2767c0b34e9366d4b9079393e1e09
-
SHA512
98cc1b7a5ef0193b4232dcd20c185a316a68eb14b872e26fb0021b6e2cbb5b66570b9cab34e006afcd8ecb6ddd04ec4001303a19ed69d12ff6d45e2e1c2dd297
Score
10/10
Malware Config
Extracted
Family
icedid
Campaign
1211238709
C2
feaser2347.club
Signatures
-
IcedID First Stage Loader 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1784-3-0x00000000002B0000-0x00000000002B7000-memory.dmp IcedidFirstLoader -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 1784 regsvr32.exe 1784 regsvr32.exe