Analysis
-
max time kernel
152s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
16-03-2022 21:36
Static task
static1
Behavioral task
behavioral1
Sample
ad7dfd8a04411cbe96ee8772a0f67da5ae2cf87bf13e0b286c2de937037cfb7e.dll
Resource
win7-20220311-en
windows7_x64
0 signatures
0 seconds
General
-
Target
ad7dfd8a04411cbe96ee8772a0f67da5ae2cf87bf13e0b286c2de937037cfb7e.dll
-
Size
232KB
-
MD5
98df07ecb8521689dd3a818674a56dba
-
SHA1
7174ff35230dfcbcd70bc6e4d84f299b717b990c
-
SHA256
ad7dfd8a04411cbe96ee8772a0f67da5ae2cf87bf13e0b286c2de937037cfb7e
-
SHA512
c91bbae26f5be163d1de34bc0de3de51af9c7abe9a2e3641f95fc1f7194a2ed616b06744092c3f3a37d17c428e2e61a02f7fcc5c9cdd21d64189cf868b55f6e0
Malware Config
Extracted
Family
icedid
C2
understandingtroll.cyou
rozathetroll.pw
Signatures
-
IcedID Second Stage Loader 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1460-132-0x0000000000650000-0x00000000006EB000-memory.dmp IcedidSecondLoader behavioral2/memory/1460-134-0x0000000000650000-0x0000000000656000-memory.dmp IcedidSecondLoader behavioral2/memory/1460-135-0x0000000000651000-0x0000000000669000-memory.dmp IcedidSecondLoader -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1268 wrote to memory of 1460 1268 rundll32.exe rundll32.exe PID 1268 wrote to memory of 1460 1268 rundll32.exe rundll32.exe PID 1268 wrote to memory of 1460 1268 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ad7dfd8a04411cbe96ee8772a0f67da5ae2cf87bf13e0b286c2de937037cfb7e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ad7dfd8a04411cbe96ee8772a0f67da5ae2cf87bf13e0b286c2de937037cfb7e.dll,#12⤵PID:1460