Analysis
-
max time kernel
445s -
max time network
458s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
25-02-2022 20:47
Static task
static1
Behavioral task
behavioral1
Sample
f2e08df6880d599f89c5b4d5497164ab4489e79c233555c53031a90b02d11f51.dll
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
f2e08df6880d599f89c5b4d5497164ab4489e79c233555c53031a90b02d11f51.dll
Resource
win10v2004-en-20220112
General
-
Target
f2e08df6880d599f89c5b4d5497164ab4489e79c233555c53031a90b02d11f51.dll
-
Size
596KB
-
MD5
7f2fe3d160080e09ea51d58ab0e1ae8f
-
SHA1
5a84cccf6640f5cd8ea69e93ccbb97aa15f0968e
-
SHA256
f2e08df6880d599f89c5b4d5497164ab4489e79c233555c53031a90b02d11f51
-
SHA512
978bfecf51833c4ea03bddccac1c3325cf2b67d8083ae5be87e882e807af51b09c181a2b44f36ab03ecdc38be6e018e1d233e9030d3f029fea1e906df26ed0c5
Malware Config
Extracted
icedid
1117948791
reseptors.com
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 516 regsvr32.exe 516 regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\f2e08df6880d599f89c5b4d5497164ab4489e79c233555c53031a90b02d11f51.dll1⤵
- Suspicious behavior: EnumeratesProcesses
PID:516
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k wusvcs -p1⤵PID:3656