Analysis
-
max time kernel
4294179s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
20-03-2022 02:12
Static task
static1
Behavioral task
behavioral1
Sample
675516917f7dbaeeb7d22d5e5caa4b537376b098f53736996bed177ffde696f7.dll
Resource
win7-20220311-en
windows7_x64
0 signatures
0 seconds
General
-
Target
675516917f7dbaeeb7d22d5e5caa4b537376b098f53736996bed177ffde696f7.dll
-
Size
229KB
-
MD5
aaadfeda3770294df350381a1e42b32c
-
SHA1
5bf60a0c84129d1448c33e7876836c4b90e0bba0
-
SHA256
675516917f7dbaeeb7d22d5e5caa4b537376b098f53736996bed177ffde696f7
-
SHA512
ac9f9a9c3a85a936a936c67197690cd50627367dc11244910baa395c920faa2a47f88b0e1420f00623b117105276b421219d870501e6c420bdd10d4facc06e55
Malware Config
Extracted
Family
icedid
Signatures
-
IcedID First Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1948-55-0x0000000075280000-0x000000007528A000-memory.dmp IcedidFirstLoader behavioral1/memory/1948-56-0x0000000075280000-0x00000000752CC000-memory.dmp IcedidFirstLoader -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1468 1948 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1940 wrote to memory of 1948 1940 rundll32.exe rundll32.exe PID 1940 wrote to memory of 1948 1940 rundll32.exe rundll32.exe PID 1940 wrote to memory of 1948 1940 rundll32.exe rundll32.exe PID 1940 wrote to memory of 1948 1940 rundll32.exe rundll32.exe PID 1940 wrote to memory of 1948 1940 rundll32.exe rundll32.exe PID 1940 wrote to memory of 1948 1940 rundll32.exe rundll32.exe PID 1940 wrote to memory of 1948 1940 rundll32.exe rundll32.exe PID 1948 wrote to memory of 1468 1948 rundll32.exe WerFault.exe PID 1948 wrote to memory of 1468 1948 rundll32.exe WerFault.exe PID 1948 wrote to memory of 1468 1948 rundll32.exe WerFault.exe PID 1948 wrote to memory of 1468 1948 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\675516917f7dbaeeb7d22d5e5caa4b537376b098f53736996bed177ffde696f7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\675516917f7dbaeeb7d22d5e5caa4b537376b098f53736996bed177ffde696f7.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1948 -s 2363⤵
- Program crash
PID:1468