Analysis
-
max time kernel
151s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
19-02-2022 18:06
Static task
static1
Behavioral task
behavioral1
Sample
076da05987d7b49eaf6a5ba599117839.dll
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
076da05987d7b49eaf6a5ba599117839.dll
Resource
win10v2004-en-20220113
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
076da05987d7b49eaf6a5ba599117839.dll
-
Size
559KB
-
MD5
076da05987d7b49eaf6a5ba599117839
-
SHA1
ca04036a3c15b57dd89421b265705f01aaa10c5a
-
SHA256
841c94ef717b5fd39ee1bfe6cd80700080174b598376a6a393d0d36cac777f13
-
SHA512
05e881a2ca730d55e130e45d981e80cfc7378753d6fe3ade62f3e7b949d9dab45dfa4d06d19e83995e81b9aabec516984795165f60a3bfaaaa5b09b2023c4cb5
Score
10/10
Malware Config
Extracted
Family
icedid
Campaign
1117948791
C2
reseptors.com
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Drops file in Windows directory 6 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 2256 regsvr32.exe 2256 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
svchost.exedescription pid process Token: SeShutdownPrivilege 4604 svchost.exe Token: SeCreatePagefilePrivilege 4604 svchost.exe Token: SeShutdownPrivilege 4604 svchost.exe Token: SeCreatePagefilePrivilege 4604 svchost.exe Token: SeShutdownPrivilege 4604 svchost.exe Token: SeCreatePagefilePrivilege 4604 svchost.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\076da05987d7b49eaf6a5ba599117839.dll1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2256
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4604