Analysis
-
max time kernel
147s -
max time network
121s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
25-02-2022 07:02
Static task
static1
Behavioral task
behavioral1
Sample
004721033b1e95ce94fe8c3b9a2898c3b7e82d2b2d6060a1b6e5ea09aeb4535f.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
004721033b1e95ce94fe8c3b9a2898c3b7e82d2b2d6060a1b6e5ea09aeb4535f.exe
-
Size
718KB
-
MD5
985ccc5e454e09ecabb8ff1f84f03e74
-
SHA1
2a9a1f9462a69beae64e951ed600d33e00741ad3
-
SHA256
004721033b1e95ce94fe8c3b9a2898c3b7e82d2b2d6060a1b6e5ea09aeb4535f
-
SHA512
f8d3e0534618612644800f1c3ca120295a8f40e2295986272e11eb10cb323534595f9798c8750cd5e416e070430d7e2c4c388208cb6056c04c822274cfbd8e29
Malware Config
Extracted
Family
icedid
C2
kostacardsplayer.pro
kostafootball.info
countrylandlords.info
landiscloudlord.red
Signatures
-
IcedID Second Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1648-55-0x0000000000250000-0x0000000000255000-memory.dmp IcedidSecondLoader behavioral1/memory/1648-59-0x0000000000240000-0x0000000000242000-memory.dmp IcedidSecondLoader -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
004721033b1e95ce94fe8c3b9a2898c3b7e82d2b2d6060a1b6e5ea09aeb4535f.exepid process 1648 004721033b1e95ce94fe8c3b9a2898c3b7e82d2b2d6060a1b6e5ea09aeb4535f.exe