Analysis
-
max time kernel
150s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
02-05-2022 01:20
Static task
static1
Behavioral task
behavioral1
Sample
675a43500f32535f721aad0814259f258dcaf8752c4066de96905105a2d01df5.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
675a43500f32535f721aad0814259f258dcaf8752c4066de96905105a2d01df5.dll
-
Size
224KB
-
MD5
1fed8d8ea7227badc57cb9a25fe55136
-
SHA1
d3b7a15a58d97544ad3ba1d2f11834c2e701b8d4
-
SHA256
675a43500f32535f721aad0814259f258dcaf8752c4066de96905105a2d01df5
-
SHA512
2b8fd50920b5d2b0689c8028f74d59baafa87cf1d7fcc1941128238742276bff4ac8426a60dd7a20695bf64a2f6b5d2fd27a17ea3ca8c3796ee3aa93a6bed894
Malware Config
Extracted
Family
icedid
C2
loadberlin.casa
Signatures
-
IcedID First Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1928-56-0x0000000074BA0000-0x0000000074BA6000-memory.dmp IcedidFirstLoader behavioral1/memory/1928-57-0x0000000074BA0000-0x0000000074BE4000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 18 IoCs
Processes:
rundll32.exeflow pid process 3 1928 rundll32.exe 4 1928 rundll32.exe 6 1928 rundll32.exe 8 1928 rundll32.exe 10 1928 rundll32.exe 11 1928 rundll32.exe 13 1928 rundll32.exe 14 1928 rundll32.exe 16 1928 rundll32.exe 17 1928 rundll32.exe 21 1928 rundll32.exe 22 1928 rundll32.exe 24 1928 rundll32.exe 25 1928 rundll32.exe 27 1928 rundll32.exe 28 1928 rundll32.exe 29 1928 rundll32.exe 30 1928 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1856 wrote to memory of 1928 1856 rundll32.exe rundll32.exe PID 1856 wrote to memory of 1928 1856 rundll32.exe rundll32.exe PID 1856 wrote to memory of 1928 1856 rundll32.exe rundll32.exe PID 1856 wrote to memory of 1928 1856 rundll32.exe rundll32.exe PID 1856 wrote to memory of 1928 1856 rundll32.exe rundll32.exe PID 1856 wrote to memory of 1928 1856 rundll32.exe rundll32.exe PID 1856 wrote to memory of 1928 1856 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\675a43500f32535f721aad0814259f258dcaf8752c4066de96905105a2d01df5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\675a43500f32535f721aad0814259f258dcaf8752c4066de96905105a2d01df5.dll,#12⤵
- Blocklisted process makes network request
PID:1928