Analysis
-
max time kernel
129s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
20-02-2022 13:41
Static task
static1
Behavioral task
behavioral1
Sample
c5169e0fa3ddc3c4ba3e71ba9e7d9bbc.dll
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
c5169e0fa3ddc3c4ba3e71ba9e7d9bbc.dll
Resource
win10v2004-en-20220113
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
c5169e0fa3ddc3c4ba3e71ba9e7d9bbc.dll
-
Size
608KB
-
MD5
c5169e0fa3ddc3c4ba3e71ba9e7d9bbc
-
SHA1
51ef539bea4b7cd86c7d5eecd85bee70918f704f
-
SHA256
abe63be5854813b62f29876a2480cb2ed1eae4d9dcd51596390b62c2befc0988
-
SHA512
9e858ac59a6a9ab7b4d8d035f31904d72b4312a31f7d267628de80ea22dc2731a06b57f9ec3a6abea3984e4026389e0c43781105e32c8e58e12bbf380d9029ca
Score
10/10
Malware Config
Extracted
Family
icedid
Campaign
1117948791
C2
reseptors.com
Signatures
-
Drops file in Windows directory 6 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 2208 regsvr32.exe 2208 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
svchost.exedescription pid process Token: SeShutdownPrivilege 1352 svchost.exe Token: SeCreatePagefilePrivilege 1352 svchost.exe Token: SeShutdownPrivilege 1352 svchost.exe Token: SeCreatePagefilePrivilege 1352 svchost.exe Token: SeShutdownPrivilege 1352 svchost.exe Token: SeCreatePagefilePrivilege 1352 svchost.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\c5169e0fa3ddc3c4ba3e71ba9e7d9bbc.dll1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2208
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1352