Analysis
-
max time kernel
113s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
23-02-2022 23:50
Static task
static1
Behavioral task
behavioral1
Sample
10D2.exe
Resource
win7-20220223-en
windows7_x64
0 signatures
0 seconds
General
-
Target
10D2.exe
-
Size
699KB
-
MD5
4b71805d51193b0dbe39321475ba41ed
-
SHA1
2c69d33ee6cad5557f088f205f7c031b5d7d003c
-
SHA256
a98112f55dfd1fe971be934510d681e30fad6bc0edd9b4ba5c888f0080a5ed68
-
SHA512
9f882d0a3117c9b530bdcea67b36601a26024cfa0d505cfa0e06c4a2b675751ad453f220329b1cc8171fedfb576d73d58d8e13e726af08344307a257d078c608
Malware Config
Extracted
Family
icedid
Campaign
2715004312
C2
badgoodreason.com
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
IcedID First Stage Loader 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3448-130-0x000001C4D2410000-0x000001C4D241B000-memory.dmp IcedidFirstLoader -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
10D2.exepid process 3448 10D2.exe 3448 10D2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
10D2.exepid process 3448 10D2.exe