Analysis
-
max time kernel
4294216s -
max time network
171s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
24-03-2022 19:22
Static task
static1
Behavioral task
behavioral1
Sample
5367acae0dec8ceae1de5d8f617d61ab486715c0b4f9c7b5350513b021fac508.dll
Resource
win7-20220310-en
windows7_x64
0 signatures
0 seconds
General
-
Target
5367acae0dec8ceae1de5d8f617d61ab486715c0b4f9c7b5350513b021fac508.dll
-
Size
209KB
-
MD5
bce3f6df2481cc576f243dd2a8b46c54
-
SHA1
c0e7211cd87ff2d7cfa40fac1f564d6081aab3ab
-
SHA256
5367acae0dec8ceae1de5d8f617d61ab486715c0b4f9c7b5350513b021fac508
-
SHA512
101c88d4ac961daa1ed8db10fda43f55142c69d789795a77677432f815044a66a354f44102863bd77c881c2de31a1b43164913406ac902ebe9f6e35331bf83f3
Malware Config
Extracted
Family
icedid
C2
singularitty.best
zolerasiop.club
Signatures
-
IcedID Second Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1076-56-0x0000000074890000-0x00000000748DC000-memory.dmp IcedidSecondLoader behavioral1/memory/1076-57-0x0000000074890000-0x0000000074896000-memory.dmp IcedidSecondLoader -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1904 wrote to memory of 1076 1904 rundll32.exe rundll32.exe PID 1904 wrote to memory of 1076 1904 rundll32.exe rundll32.exe PID 1904 wrote to memory of 1076 1904 rundll32.exe rundll32.exe PID 1904 wrote to memory of 1076 1904 rundll32.exe rundll32.exe PID 1904 wrote to memory of 1076 1904 rundll32.exe rundll32.exe PID 1904 wrote to memory of 1076 1904 rundll32.exe rundll32.exe PID 1904 wrote to memory of 1076 1904 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5367acae0dec8ceae1de5d8f617d61ab486715c0b4f9c7b5350513b021fac508.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5367acae0dec8ceae1de5d8f617d61ab486715c0b4f9c7b5350513b021fac508.dll,#12⤵PID:1076