Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
26-03-2022 11:28
Static task
static1
Behavioral task
behavioral1
Sample
27ff1bd0e222bc76fce44929314c9be6e8a6c1ab35934fa4437cf2bfce34ca2c.dll
Resource
win7-20220311-en
windows7_x64
0 signatures
0 seconds
General
-
Target
27ff1bd0e222bc76fce44929314c9be6e8a6c1ab35934fa4437cf2bfce34ca2c.dll
-
Size
310KB
-
MD5
758456fa79125ce50201b45d78be19ed
-
SHA1
a017a755908d26bc0f4bbc563590b29c96df5acc
-
SHA256
27ff1bd0e222bc76fce44929314c9be6e8a6c1ab35934fa4437cf2bfce34ca2c
-
SHA512
bd8682ed58888d0d9493501f1d990c54184769aa24252190e092ed09b386d2c8e28746df596ee92633dcc67b4e37ac7d62ab0b7b6dffe4157e4f2c2a561d4640
Malware Config
Extracted
Family
icedid
C2
revopilte3.club
aweragiprooslk.cyou
Signatures
-
IcedID Second Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1016-131-0x0000000075800000-0x0000000075806000-memory.dmp IcedidSecondLoader behavioral2/memory/1016-132-0x0000000075800000-0x000000007585C000-memory.dmp IcedidSecondLoader -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid process target process PID 408 wrote to memory of 1016 408 regsvr32.exe regsvr32.exe PID 408 wrote to memory of 1016 408 regsvr32.exe regsvr32.exe PID 408 wrote to memory of 1016 408 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\27ff1bd0e222bc76fce44929314c9be6e8a6c1ab35934fa4437cf2bfce34ca2c.dll1⤵
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\27ff1bd0e222bc76fce44929314c9be6e8a6c1ab35934fa4437cf2bfce34ca2c.dll2⤵PID:1016
-