Analysis
-
max time kernel
150s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
30-03-2022 00:19
Static task
static1
Behavioral task
behavioral1
Sample
0b5fb7ad159eadbdaed3fed5543726f6caf26c4cd80975a2eee7a9652508a981.dll
Resource
win7-20220310-en
windows7_x64
0 signatures
0 seconds
General
-
Target
0b5fb7ad159eadbdaed3fed5543726f6caf26c4cd80975a2eee7a9652508a981.dll
-
Size
346KB
-
MD5
abc37906eee7e7b7efd2a0ecb629039a
-
SHA1
320375e599c2a8700b3f1c5de0c2c8c27fb212dc
-
SHA256
0b5fb7ad159eadbdaed3fed5543726f6caf26c4cd80975a2eee7a9652508a981
-
SHA512
03a4ecdaf3792681f78a05140f4728b385330f50ede0173da681dbf1f743000ff9300f9d04b15509f9e2d2d3c1d8df6e91709601fa658fcc61609c45e4470e2b
Malware Config
Extracted
Family
icedid
Signatures
-
IcedID First Stage Loader 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1780-131-0x0000000075360000-0x0000000075366000-memory.dmp IcedidFirstLoader -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid process target process PID 1484 wrote to memory of 1780 1484 regsvr32.exe regsvr32.exe PID 1484 wrote to memory of 1780 1484 regsvr32.exe regsvr32.exe PID 1484 wrote to memory of 1780 1484 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\0b5fb7ad159eadbdaed3fed5543726f6caf26c4cd80975a2eee7a9652508a981.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\0b5fb7ad159eadbdaed3fed5543726f6caf26c4cd80975a2eee7a9652508a981.dll2⤵PID:1780
-