Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
15-03-2022 16:33
Static task
static1
Behavioral task
behavioral1
Sample
c9a0d2f664277db1c90ebb2bc9549ef36d0fcd97332a47144ddaee0c1a2e725f.dll
Resource
win7-20220310-en
windows7_x64
0 signatures
0 seconds
General
-
Target
c9a0d2f664277db1c90ebb2bc9549ef36d0fcd97332a47144ddaee0c1a2e725f.dll
-
Size
460KB
-
MD5
afcdc096a7a22b16a2343bd1dd0fca4f
-
SHA1
f4eac2b02fcee42298b8b0352e4fd146fe97c9f5
-
SHA256
c9a0d2f664277db1c90ebb2bc9549ef36d0fcd97332a47144ddaee0c1a2e725f
-
SHA512
5db4c9c33781a747e82dd568214cf906a50c44371c83a5f9a4c29edbc4f4379bc0e44c14f8a67dc8047c4ba915011889c1e50b51a7da6155cc31777531737183
Malware Config
Extracted
Family
icedid
C2
karimorodrigo.pw
airtopolos.best
Signatures
-
IcedID Second Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1744-130-0x0000000074FC0000-0x0000000074FC6000-memory.dmp IcedidSecondLoader behavioral2/memory/1744-131-0x0000000074FC0000-0x0000000075037000-memory.dmp IcedidSecondLoader -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1592 wrote to memory of 1744 1592 rundll32.exe rundll32.exe PID 1592 wrote to memory of 1744 1592 rundll32.exe rundll32.exe PID 1592 wrote to memory of 1744 1592 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c9a0d2f664277db1c90ebb2bc9549ef36d0fcd97332a47144ddaee0c1a2e725f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c9a0d2f664277db1c90ebb2bc9549ef36d0fcd97332a47144ddaee0c1a2e725f.dll,#12⤵PID:1744
-