Analysis
-
max time kernel
285s -
max time network
875s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
09-03-2022 22:49
Static task
static1
Behavioral task
behavioral1
Sample
main1.dll
Resource
win7-20220223-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
main1.dll
Resource
win10-en-20211208
windows10_x64
0 signatures
0 seconds
General
-
Target
main1.dll
-
Size
1.2MB
-
MD5
657b8f163f8fcb7364d0710f69ccdadd
-
SHA1
aa035a6c9eb17be8065026fa8226c5cbbe7813c5
-
SHA256
16c00b9d56ad2f7d20409313a85a0a6375047a3a975ccc8e9e80afbf1c20bd5f
-
SHA512
1d2bc7edc534046bfbf065ec12ff825b1d553a0ff55e82368f657725ab935a7923ad71529eac42b56f37492c063b3592a313d41fb541a2645f90b8b29c79dc52
Score
10/10
Malware Config
Extracted
Family
icedid
Campaign
3993579037
C2
yourgroceries.top
Signatures
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
powershell.exeregsvr32.exeregsvr32.exepid process 1924 powershell.exe 1924 powershell.exe 1924 powershell.exe 4180 regsvr32.exe 4180 regsvr32.exe 4256 regsvr32.exe 4256 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1924 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
powershell.execmd.exedescription pid process target process PID 1924 wrote to memory of 4320 1924 powershell.exe cmd.exe PID 1924 wrote to memory of 4320 1924 powershell.exe cmd.exe PID 4320 wrote to memory of 4256 4320 cmd.exe regsvr32.exe PID 4320 wrote to memory of 4256 4320 cmd.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\main1.dll1⤵
- Suspicious behavior: EnumeratesProcesses
PID:4180
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\system32\regsvr32.exeregsvr32 main1.dll3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4256