Analysis
-
max time kernel
4294213s -
max time network
168s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
24-03-2022 19:22
Static task
static1
Behavioral task
behavioral1
Sample
23107ae7bb231f86c7b94eb0b6e6b82c82f1909c9d0060b79a2738369087b8a0.dll
Resource
win7-20220310-en
windows7_x64
0 signatures
0 seconds
General
-
Target
23107ae7bb231f86c7b94eb0b6e6b82c82f1909c9d0060b79a2738369087b8a0.dll
-
Size
149KB
-
MD5
ddef1f44300fc974a5be3225253edab8
-
SHA1
b5f1297c459e4843f9830834a481fbe604db92ea
-
SHA256
23107ae7bb231f86c7b94eb0b6e6b82c82f1909c9d0060b79a2738369087b8a0
-
SHA512
24688514519953fd197f503bbe314b3585233d1d3bfd5013810b73267bdd414dbcc6cfb9d213c757d4464a71749d8a16cbc5ae71dd4cebe42721862678f03994
Malware Config
Extracted
Family
icedid
C2
rotmistr.club
5kilozhuto.top
Signatures
-
IcedID Second Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1612-56-0x0000000074C60000-0x0000000074C98000-memory.dmp IcedidSecondLoader behavioral1/memory/1612-57-0x0000000074C60000-0x0000000074C66000-memory.dmp IcedidSecondLoader -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1396 wrote to memory of 1612 1396 rundll32.exe rundll32.exe PID 1396 wrote to memory of 1612 1396 rundll32.exe rundll32.exe PID 1396 wrote to memory of 1612 1396 rundll32.exe rundll32.exe PID 1396 wrote to memory of 1612 1396 rundll32.exe rundll32.exe PID 1396 wrote to memory of 1612 1396 rundll32.exe rundll32.exe PID 1396 wrote to memory of 1612 1396 rundll32.exe rundll32.exe PID 1396 wrote to memory of 1612 1396 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\23107ae7bb231f86c7b94eb0b6e6b82c82f1909c9d0060b79a2738369087b8a0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\23107ae7bb231f86c7b94eb0b6e6b82c82f1909c9d0060b79a2738369087b8a0.dll,#12⤵PID:1612