Analysis
-
max time kernel
23s -
max time network
54s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
04-12-2021 01:48
Static task
static1
Behavioral task
behavioral1
Sample
46e20b3931c4550ade3e4abd395a289621ea3f42f6aa44c90083ebb7f7be2704.dll
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
46e20b3931c4550ade3e4abd395a289621ea3f42f6aa44c90083ebb7f7be2704.dll
Resource
win10-en-20211104
General
-
Target
46e20b3931c4550ade3e4abd395a289621ea3f42f6aa44c90083ebb7f7be2704.dll
-
Size
344KB
-
MD5
2ee33ef3b24574c9fb54fd75e29fdf6e
-
SHA1
158a048f5f5feac85eb5791fbb25ba6aaf262712
-
SHA256
46e20b3931c4550ade3e4abd395a289621ea3f42f6aa44c90083ebb7f7be2704
-
SHA512
0655a316b91070c8275afba7ab8437da66cd8b00e4ddcc58c86fa28444deb66700d19e76e93329910c7e44ef28ec488556e2026221980b6aacaa804745a56c5e
Malware Config
Extracted
icedid
2904573523
placingapie.ink
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 420 regsvr32.exe 420 regsvr32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/420-118-0x0000000002960000-0x00000000029C3000-memory.dmpFilesize
396KB