Analysis
-
max time kernel
129s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
26-03-2022 00:01
Static task
static1
Behavioral task
behavioral1
Sample
5c9786ee424ec48c047fa168c077e16808a607abe101c6c92c0e6d4d0246aeda.dll
Resource
win7-20220311-en
windows7_x64
0 signatures
0 seconds
General
-
Target
5c9786ee424ec48c047fa168c077e16808a607abe101c6c92c0e6d4d0246aeda.dll
-
Size
346KB
-
MD5
3efdb0532d1b5b4cafb3602c78a0f559
-
SHA1
10b153cb40b85ec5510e30aa1ba5039c62d7823a
-
SHA256
5c9786ee424ec48c047fa168c077e16808a607abe101c6c92c0e6d4d0246aeda
-
SHA512
68b459a47f84a6c26c3db24f674aeb7ecc85d1428861f78eb18e4c427e589796fc8ffc8cb5857b55c99e6dbe5be9b79b38a7925d0a54e43318b49c22dc37adf1
Malware Config
Extracted
Family
icedid
Signatures
-
IcedID First Stage Loader 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2548-131-0x0000000075610000-0x0000000075616000-memory.dmp IcedidFirstLoader -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid process target process PID 2376 wrote to memory of 2548 2376 regsvr32.exe regsvr32.exe PID 2376 wrote to memory of 2548 2376 regsvr32.exe regsvr32.exe PID 2376 wrote to memory of 2548 2376 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\5c9786ee424ec48c047fa168c077e16808a607abe101c6c92c0e6d4d0246aeda.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\5c9786ee424ec48c047fa168c077e16808a607abe101c6c92c0e6d4d0246aeda.dll2⤵PID:2548