Analysis
-
max time kernel
107s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
19-03-2022 21:49
Static task
static1
Behavioral task
behavioral1
Sample
4cd93797e162d5ae1940d4f754552ee9cf597f8aff9f667b2bfeae0e63168bd5.dll
Resource
win7-20220311-en
windows7_x64
0 signatures
0 seconds
General
-
Target
4cd93797e162d5ae1940d4f754552ee9cf597f8aff9f667b2bfeae0e63168bd5.dll
-
Size
177KB
-
MD5
5df7b2447c58d5b45c2842b02854391b
-
SHA1
d65b7b7a2f83cddf3a2b3ce048acaf4f2ee2aa37
-
SHA256
4cd93797e162d5ae1940d4f754552ee9cf597f8aff9f667b2bfeae0e63168bd5
-
SHA512
25fbce62e93cd1fd35467467195c55ed006b9c40fc7828bf029c68aa138acf14f0064815e60540426e99472c554903404eaeb0943fe9d96fc0b33e5eb4627308
Malware Config
Extracted
Family
icedid
Signatures
-
IcedID First Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1332-134-0x0000000074E50000-0x0000000074E8F000-memory.dmp IcedidFirstLoader behavioral2/memory/1332-136-0x0000000074E50000-0x0000000074E59000-memory.dmp IcedidFirstLoader -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid process target process PID 408 wrote to memory of 1332 408 regsvr32.exe regsvr32.exe PID 408 wrote to memory of 1332 408 regsvr32.exe regsvr32.exe PID 408 wrote to memory of 1332 408 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\4cd93797e162d5ae1940d4f754552ee9cf597f8aff9f667b2bfeae0e63168bd5.dll1⤵
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\4cd93797e162d5ae1940d4f754552ee9cf597f8aff9f667b2bfeae0e63168bd5.dll2⤵PID:1332