Analysis
-
max time kernel
102s -
max time network
99s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
20-05-2021 16:37
Static task
static1
Behavioral task
behavioral1
Sample
0085b9f4536d96dafb67cb2293662f607266ae5da53d3.dll
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
0085b9f4536d96dafb67cb2293662f607266ae5da53d3.dll
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
0085b9f4536d96dafb67cb2293662f607266ae5da53d3.dll
-
Size
40KB
-
MD5
5a043575411015d76f638a4d13e32300
-
SHA1
b74e5a0190456aea96fc51787ad41df8ed804666
-
SHA256
0085b9f4536d96dafb67cb2293662f607266ae5da53d39249bad772ce2766268
-
SHA512
a9e740ccebe42d9f9662417078135f15d8701e15b6dfd930bca202365b3328c70ad42aa51d3de4cbb2672a6f1969aa3ee4f50c3bfa4db4b7a9710338675ad9b7
Score
10/10
Malware Config
Extracted
Family
icedid
Campaign
632457322
C2
kickersflyers.bid
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1632-61-0x0000000000130000-0x000000000018B000-memory.dmp crime_win32_icedid_stage1 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 1632 regsvr32.exe 1632 regsvr32.exe