Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220331-en -
submitted
30-03-2022 09:01
Static task
static1
Behavioral task
behavioral1
Sample
6ad0ca051919158a2fdcec48ed276b4e1b9b844524c9c2d0e94af2e2ccfb0c9b.dll
Resource
win7-20220331-en
windows7_x64
0 signatures
0 seconds
General
-
Target
6ad0ca051919158a2fdcec48ed276b4e1b9b844524c9c2d0e94af2e2ccfb0c9b.dll
-
Size
310KB
-
MD5
73a46c37613daccbd83441736050768e
-
SHA1
72884a50fd477ac572254bc0d2e839f81b601298
-
SHA256
6ad0ca051919158a2fdcec48ed276b4e1b9b844524c9c2d0e94af2e2ccfb0c9b
-
SHA512
0af35d61d6dc438f49f7d6397494cef4dedeee0c18318ffca8c65146fdb4f52f4ff7d66812d9e117a54876cf4701d67448f00183c3733fa71355544f2f04d858
Malware Config
Extracted
Family
icedid
C2
revopilte3.club
aweragiprooslk.cyou
Signatures
-
IcedID Second Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3228-125-0x0000000074C50000-0x0000000074C56000-memory.dmp IcedidSecondLoader behavioral2/memory/3228-126-0x0000000074C50000-0x0000000074CAC000-memory.dmp IcedidSecondLoader -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid process target process PID 4244 wrote to memory of 3228 4244 regsvr32.exe regsvr32.exe PID 4244 wrote to memory of 3228 4244 regsvr32.exe regsvr32.exe PID 4244 wrote to memory of 3228 4244 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\6ad0ca051919158a2fdcec48ed276b4e1b9b844524c9c2d0e94af2e2ccfb0c9b.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\6ad0ca051919158a2fdcec48ed276b4e1b9b844524c9c2d0e94af2e2ccfb0c9b.dll2⤵PID:3228
-