Analysis
-
max time kernel
1142s -
max time network
1145s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
21-10-2021 09:30
Static task
static1
Behavioral task
behavioral1
Sample
d13ae2121af3bc78790d5191c543c7b.exe.dll
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
d13ae2121af3bc78790d5191c543c7b.exe.dll
-
Size
65KB
-
MD5
d13ae2121af3bc78790d5191c543c7b3
-
SHA1
4096d8c93f1bb01dfd4871bb8fffb5b0e59832c9
-
SHA256
9e2d1466480a6265cb65de5f2bca7971c5fe3aa5fdb3c6d78a0595ba413f10a1
-
SHA512
13dc335a17880453f826d878bb3674463dac25fb64cff3e7b678cfba58771b2c76376d6c0d4e4f61da7a542f98620d398184af265f5daca41648d81282051742
Score
10/10
Malware Config
Extracted
Family
icedid
Campaign
3717128962
C2
usaaforced.fun
Signatures
-
IcedID First Stage Loader 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2492-115-0x0000000001280000-0x0000000001287000-memory.dmp IcedidFirstLoader -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 2492 regsvr32.exe 2492 regsvr32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2492-115-0x0000000001280000-0x0000000001287000-memory.dmpFilesize
28KB