Analysis
-
max time kernel
119s -
max time network
132s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
25-10-2021 16:43
Static task
static1
Behavioral task
behavioral1
Sample
141.exe
Resource
win7-en-20211014
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
141.exe
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
141.exe
-
Size
169KB
-
MD5
81fc38de5b6197c4db58eb506037e7cb
-
SHA1
c2258ab3204e6061d548df202c99aa361242d848
-
SHA256
2b9cba43290c9d4cc2d6a47432ddac5752c63e5ac519c2056ba466580424ed3b
-
SHA512
4c96e9104e55454e741a13be34a7c5a3afb8d0d17c1924d629acbd487975d88d4435fd46b34649defe2d047ff4c84e06c4a0d0176085c7b5ab4d80eed18b0d9a
Score
10/10
Malware Config
Extracted
Family
icedid
Campaign
1875681804
C2
enticationmetho.ink
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3048-115-0x0000000140000000-0x0000000140009000-memory.dmp crime_ICEDID_win64_gziploader -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
141.exepid process 3048 141.exe 3048 141.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3048-115-0x0000000140000000-0x0000000140009000-memory.dmpFilesize
36KB