Analysis
-
max time kernel
118s -
max time network
139s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
15-02-2022 07:00
Static task
static1
Behavioral task
behavioral1
Sample
bc6a441a3036c1310886b671943e487d47f2c7d1b4bd125d7b0cf0f3090b8281.dll
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
bc6a441a3036c1310886b671943e487d47f2c7d1b4bd125d7b0cf0f3090b8281.dll
-
Size
552KB
-
MD5
791779361e8db64ec7fbeb8b82d68ce7
-
SHA1
8632bff9f308fa57ae5bd1aad56b5ec8ff91f466
-
SHA256
bc6a441a3036c1310886b671943e487d47f2c7d1b4bd125d7b0cf0f3090b8281
-
SHA512
da4b1b98c6d190311cc5df10c91560a2818d8aa1707d9d77a8fe4275d99766ff29f3d39588b200986f3d0e5eb001a72b5b459f1e95e1e34d875ceb531d6079b4
Malware Config
Extracted
Family
icedid
Campaign
412701809
C2
hdtrenity.com
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1136 1520 WerFault.exe regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
regsvr32.exeWerFault.exepid process 1520 regsvr32.exe 1520 regsvr32.exe 1136 WerFault.exe 1136 WerFault.exe 1136 WerFault.exe 1136 WerFault.exe 1136 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WerFault.exedescription pid process Token: SeDebugPrivilege 1136 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid process target process PID 1520 wrote to memory of 1136 1520 regsvr32.exe WerFault.exe PID 1520 wrote to memory of 1136 1520 regsvr32.exe WerFault.exe PID 1520 wrote to memory of 1136 1520 regsvr32.exe WerFault.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\bc6a441a3036c1310886b671943e487d47f2c7d1b4bd125d7b0cf0f3090b8281.dll1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1520 -s 2442⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1136
-