Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
06-05-2021 08:02
Static task
static1
Behavioral task
behavioral1
Sample
1c6c7215d039881314d66edb35b389ab.dll
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
1c6c7215d039881314d66edb35b389ab.dll
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
1c6c7215d039881314d66edb35b389ab.dll
-
Size
116KB
-
MD5
1c6c7215d039881314d66edb35b389ab
-
SHA1
cb1515790ba1cb352a3f4bc506452b678aec2ace
-
SHA256
85bb2d449a7ead4f54667826941269a4d87a980825a958bb10db7d6e72aae60b
-
SHA512
26d0b356e10f7594c0b144b5dcbf2f35db9ad3bf609c46818c9c683f8d3dafbf9405e04af9f15e4e93b110d1ced900d90658fc342ab2b99b35733832495e10d1
Score
10/10
Malware Config
Extracted
Family
icedid
Campaign
3717128962
C2
usaaforced.fun
Signatures
-
IcedID First Stage Loader 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4448-114-0x0000000002220000-0x0000000002227000-memory.dmp IcedidFirstLoader -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 4448 regsvr32.exe 4448 regsvr32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4448-114-0x0000000002220000-0x0000000002227000-memory.dmpFilesize
28KB