Analysis
-
max time kernel
152s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
26-03-2022 13:46
Static task
static1
Behavioral task
behavioral1
Sample
0728a76febf93a8bf5b5edc9335655f93f44f46fde1346fc2a249b4cafb83220.dll
Resource
win7-20220311-en
windows7_x64
0 signatures
0 seconds
General
-
Target
0728a76febf93a8bf5b5edc9335655f93f44f46fde1346fc2a249b4cafb83220.dll
-
Size
310KB
-
MD5
baa53d9297c81190b5407770518a2f6a
-
SHA1
8d59337ae56b46c96c5454d1dabb33e0fa1eef39
-
SHA256
0728a76febf93a8bf5b5edc9335655f93f44f46fde1346fc2a249b4cafb83220
-
SHA512
b618aa7ae10a181b87ed2c1767a5ac3cbacbf68d58ab21f84891a657eb49a638a4a7e9d1dde99719528d90dbc6fd099421adba8900b034d942c06edd63b8a12d
Malware Config
Extracted
Family
icedid
C2
revopilte3.club
aweragiprooslk.cyou
Signatures
-
IcedID Second Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4484-131-0x00000000752B0000-0x00000000752B6000-memory.dmp IcedidSecondLoader behavioral2/memory/4484-132-0x00000000752B0000-0x000000007530C000-memory.dmp IcedidSecondLoader -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid process target process PID 4868 wrote to memory of 4484 4868 regsvr32.exe regsvr32.exe PID 4868 wrote to memory of 4484 4868 regsvr32.exe regsvr32.exe PID 4868 wrote to memory of 4484 4868 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\0728a76febf93a8bf5b5edc9335655f93f44f46fde1346fc2a249b4cafb83220.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\0728a76febf93a8bf5b5edc9335655f93f44f46fde1346fc2a249b4cafb83220.dll2⤵PID:4484
-