Analysis
-
max time kernel
124s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
19-03-2022 08:21
Static task
static1
Behavioral task
behavioral1
Sample
c81699ff6c94281b101d5cd48e59b1cd25675b208532c3dc22d4891480e73558.dll
Resource
win7-20220311-en
windows7_x64
0 signatures
0 seconds
General
-
Target
c81699ff6c94281b101d5cd48e59b1cd25675b208532c3dc22d4891480e73558.dll
-
Size
278KB
-
MD5
c808403e0bede8113eac59aa719c37e0
-
SHA1
8237f94ba73da9b394fedd3f6f3b5bde5680bc65
-
SHA256
c81699ff6c94281b101d5cd48e59b1cd25675b208532c3dc22d4891480e73558
-
SHA512
5248506b11c37338f6bb57aaff6fd43e8e7cdef84eef7c1e0db1eff0b2922ee66b31159408b907fff8be685ff070a511499d79985d3e4352744efd23509526b1
Malware Config
Extracted
Family
icedid
Signatures
-
IcedID First Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1388-134-0x0000000074EF0000-0x0000000074F41000-memory.dmp IcedidFirstLoader behavioral2/memory/1388-136-0x0000000074EF0000-0x0000000074EF9000-memory.dmp IcedidFirstLoader -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid process target process PID 4520 wrote to memory of 1388 4520 regsvr32.exe regsvr32.exe PID 4520 wrote to memory of 1388 4520 regsvr32.exe regsvr32.exe PID 4520 wrote to memory of 1388 4520 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\c81699ff6c94281b101d5cd48e59b1cd25675b208532c3dc22d4891480e73558.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\c81699ff6c94281b101d5cd48e59b1cd25675b208532c3dc22d4891480e73558.dll2⤵PID:1388