Analysis
-
max time kernel
148s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
19-03-2022 19:39
Static task
static1
Behavioral task
behavioral1
Sample
a42d72de0a6f75d35da5424bbaf5ccf1ccc3990793e48f599af41110e5545e0f.dll
Resource
win7-20220310-en
windows7_x64
0 signatures
0 seconds
General
-
Target
a42d72de0a6f75d35da5424bbaf5ccf1ccc3990793e48f599af41110e5545e0f.dll
-
Size
148KB
-
MD5
b1139c748cf0c458f33ada857fd3ab10
-
SHA1
1a860f7f6309e7c6b43a88650795096f92200bc6
-
SHA256
a42d72de0a6f75d35da5424bbaf5ccf1ccc3990793e48f599af41110e5545e0f
-
SHA512
0ebac8904ebb56a91a3c9e7e7b9e00efc79604b90b83f9072dd0c874fe67c7258441ba23fcba27e703034e2c02a69787a15fa1405b191f5248b2e327096061c4
Malware Config
Extracted
Family
icedid
C2
zoperawekil8.top
Signatures
-
IcedID First Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2624-134-0x0000000074C00000-0x0000000074C3F000-memory.dmp IcedidFirstLoader behavioral2/memory/2624-136-0x0000000074C00000-0x0000000074C06000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 4 IoCs
Processes:
rundll32.exeflow pid process 62 2624 rundll32.exe 76 2624 rundll32.exe 77 2624 rundll32.exe 79 2624 rundll32.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2856 2624 WerFault.exe rundll32.exe 1652 2624 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2424 wrote to memory of 2624 2424 rundll32.exe rundll32.exe PID 2424 wrote to memory of 2624 2424 rundll32.exe rundll32.exe PID 2424 wrote to memory of 2624 2424 rundll32.exe rundll32.exe PID 2624 wrote to memory of 2856 2624 rundll32.exe WerFault.exe PID 2624 wrote to memory of 2856 2624 rundll32.exe WerFault.exe PID 2624 wrote to memory of 2856 2624 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a42d72de0a6f75d35da5424bbaf5ccf1ccc3990793e48f599af41110e5545e0f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a42d72de0a6f75d35da5424bbaf5ccf1ccc3990793e48f599af41110e5545e0f.dll,#12⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2624 -s 7443⤵
- Program crash
PID:2856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2624 -s 7443⤵
- Program crash
PID:1652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2624 -ip 26241⤵PID:3880