Analysis
-
max time kernel
6s -
max time network
44s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
11-05-2021 10:36
Static task
static1
Behavioral task
behavioral1
Sample
c6d47c1f4051999dda951902c21130bf7a95982fb9a8ec470a00c6e30269ca1b.dll
Resource
win7v20210408
Behavioral task
behavioral2
Sample
c6d47c1f4051999dda951902c21130bf7a95982fb9a8ec470a00c6e30269ca1b.dll
Resource
win10v20210410
General
-
Target
c6d47c1f4051999dda951902c21130bf7a95982fb9a8ec470a00c6e30269ca1b.dll
-
Size
238KB
-
MD5
e9fb0077babd4e292d88fff9d4d12ab3
-
SHA1
3daa0a4a2fcc98eab45b716bc42bd0bcc856b573
-
SHA256
c6d47c1f4051999dda951902c21130bf7a95982fb9a8ec470a00c6e30269ca1b
-
SHA512
adb068a5bfaf22ee5705aa17c36c3c9fe133047e8bcd45d991f9916e84361c1dbbb158d55eb2dc7955031c23bad0f2cf611e0bdb1b878d4c0fdce5cda3d2cac1
Malware Config
Extracted
icedid
3042509645
barcafokliresd.top
Signatures
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\c6d47c1f4051999dda951902c21130bf7a95982fb9a8ec470a00c6e30269ca1b.dllSuspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation