Analysis
-
max time kernel
16s -
max time network
114s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
04-06-2021 15:09
Static task
static1
Behavioral task
behavioral1
Sample
ff734fe39dbcfde88977691062d0a6c17385424c3dd8b4ddeb475368d2cb7205.dll
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
ff734fe39dbcfde88977691062d0a6c17385424c3dd8b4ddeb475368d2cb7205.dll
-
Size
429KB
-
MD5
31a5457f8489684515aca714b2305570
-
SHA1
c9ee56173f91ff7376a41246547ba9b78d92334f
-
SHA256
ff734fe39dbcfde88977691062d0a6c17385424c3dd8b4ddeb475368d2cb7205
-
SHA512
2d4cf4a13ecdc3bd243c8451d4c82e37af807d0f4bf0d1920f1e2765105752ea2f2964a76ee5a93a6de6103422f11574e504dd05415722b17ed9e727035474e3
Malware Config
Extracted
Family
icedid
Campaign
548569227
C2
buzzinmaster.live
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 3984 created 564 3984 WerFault.exe regsvr32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3984 564 WerFault.exe regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
WerFault.exepid process 3984 WerFault.exe 3984 WerFault.exe 3984 WerFault.exe 3984 WerFault.exe 3984 WerFault.exe 3984 WerFault.exe 3984 WerFault.exe 3984 WerFault.exe 3984 WerFault.exe 3984 WerFault.exe 3984 WerFault.exe 3984 WerFault.exe 3984 WerFault.exe 3984 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WerFault.exedescription pid process Token: SeDebugPrivilege 3984 WerFault.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\ff734fe39dbcfde88977691062d0a6c17385424c3dd8b4ddeb475368d2cb7205.dll1⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 564 -s 4922⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/564-114-0x0000000000C60000-0x0000000000C67000-memory.dmpFilesize
28KB