Analysis
-
max time kernel
168s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
16-03-2022 12:34
Static task
static1
Behavioral task
behavioral1
Sample
43128ab24e1c625999a41027b9537dbc72b97fcef3e74e7ef69887698a2c493d.dll
Resource
win7-20220311-en
windows7_x64
0 signatures
0 seconds
General
-
Target
43128ab24e1c625999a41027b9537dbc72b97fcef3e74e7ef69887698a2c493d.dll
-
Size
460KB
-
MD5
415bab6f39e69fbb6e82a619259c9c9f
-
SHA1
e2174c5f4193c1b98c9f157d2b8ea528bcd43715
-
SHA256
43128ab24e1c625999a41027b9537dbc72b97fcef3e74e7ef69887698a2c493d
-
SHA512
63effab1dcd0165989d43162a85d33d9fb89cfb10916188fd48b24aefac8830ca2c30564d1c34eda0b21478cf6dbd9bc3106ec088be15e5e5e4814e67f63fa66
Malware Config
Extracted
Family
icedid
C2
karimorodrigo.pw
airtopolos.best
Signatures
-
IcedID Second Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1152-130-0x00000000752F0000-0x00000000752F6000-memory.dmp IcedidSecondLoader behavioral2/memory/1152-131-0x00000000752F0000-0x0000000075367000-memory.dmp IcedidSecondLoader -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1044 wrote to memory of 1152 1044 rundll32.exe rundll32.exe PID 1044 wrote to memory of 1152 1044 rundll32.exe rundll32.exe PID 1044 wrote to memory of 1152 1044 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\43128ab24e1c625999a41027b9537dbc72b97fcef3e74e7ef69887698a2c493d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\43128ab24e1c625999a41027b9537dbc72b97fcef3e74e7ef69887698a2c493d.dll,#12⤵PID:1152