Analysis
-
max time kernel
186s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
27-04-2022 18:18
Static task
static1
Behavioral task
behavioral1
Sample
21cf9b71a71a3967966955487bb3960a03ffc484c35d0e71bfe05b798f71d583.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
21cf9b71a71a3967966955487bb3960a03ffc484c35d0e71bfe05b798f71d583.dll
-
Size
260KB
-
MD5
0ba4815496bcd69f62c69cb564ad8aeb
-
SHA1
54538f577d786aaa2cdbd00cc49f74bcd4c34d76
-
SHA256
21cf9b71a71a3967966955487bb3960a03ffc484c35d0e71bfe05b798f71d583
-
SHA512
5f8f4c27a6466f6c88b10d22bf0945053d84778eae852172e592a04a04df27a2a35a61f2cdd4048240153d1de2fd38adb46c6faff0dfbdc10211bd0e510ed098
Malware Config
Extracted
Family
icedid
C2
deteresposito.club
Signatures
-
IcedID First Stage Loader 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1744-134-0x0000000002441000-0x0000000002457000-memory.dmp IcedidFirstLoader behavioral2/memory/1744-133-0x0000000002440000-0x0000000002446000-memory.dmp IcedidFirstLoader behavioral2/memory/1744-135-0x0000000002440000-0x00000000024E0000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 13 IoCs
Processes:
rundll32.exeflow pid process 29 1744 rundll32.exe 35 1744 rundll32.exe 38 1744 rundll32.exe 40 1744 rundll32.exe 44 1744 rundll32.exe 46 1744 rundll32.exe 49 1744 rundll32.exe 50 1744 rundll32.exe 52 1744 rundll32.exe 55 1744 rundll32.exe 58 1744 rundll32.exe 60 1744 rundll32.exe 62 1744 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3380 wrote to memory of 1744 3380 rundll32.exe rundll32.exe PID 3380 wrote to memory of 1744 3380 rundll32.exe rundll32.exe PID 3380 wrote to memory of 1744 3380 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\21cf9b71a71a3967966955487bb3960a03ffc484c35d0e71bfe05b798f71d583.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\21cf9b71a71a3967966955487bb3960a03ffc484c35d0e71bfe05b798f71d583.dll,#12⤵
- Blocklisted process makes network request
PID:1744