Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
27-04-2022 18:12
Static task
static1
Behavioral task
behavioral1
Sample
3a48b29632482957d30153a724c186ddb48f7425b81fe93f835809247ae01083.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
3a48b29632482957d30153a724c186ddb48f7425b81fe93f835809247ae01083.dll
-
Size
460KB
-
MD5
566ae7a039b498cca42bc0bb33d8660b
-
SHA1
61301fe1d50af65af9d0a35566eb928c81dd5aa3
-
SHA256
3a48b29632482957d30153a724c186ddb48f7425b81fe93f835809247ae01083
-
SHA512
7e8e3ee123a1472b319e4362dec35594446b6beff6312130293aaeabb17f98e83e42da85a9e651494a2374fdd8db3a1db8f0c451f3b9e5566d695f22a7f9de29
Malware Config
Extracted
Family
icedid
C2
karimorodrigo.pw
airtopolos.best
Signatures
-
IcedID Second Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3840-131-0x0000000074B50000-0x0000000074B56000-memory.dmp IcedidSecondLoader behavioral2/memory/3840-132-0x0000000074B50000-0x0000000074BC7000-memory.dmp IcedidSecondLoader -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4176 wrote to memory of 3840 4176 rundll32.exe rundll32.exe PID 4176 wrote to memory of 3840 4176 rundll32.exe rundll32.exe PID 4176 wrote to memory of 3840 4176 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3a48b29632482957d30153a724c186ddb48f7425b81fe93f835809247ae01083.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3a48b29632482957d30153a724c186ddb48f7425b81fe93f835809247ae01083.dll,#12⤵PID:3840