Analysis
-
max time kernel
166s -
max time network
198s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
02-05-2022 15:38
Static task
static1
Behavioral task
behavioral1
Sample
c49f89af3ceb178d29ce17a38888f78b324065f552b0db1195be0623ce227db4.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
c49f89af3ceb178d29ce17a38888f78b324065f552b0db1195be0623ce227db4.dll
-
Size
166KB
-
MD5
345cde136a86c6b5551768e226951351
-
SHA1
8636422b8690a01dab8b2557b1e40a1b259c56f6
-
SHA256
c49f89af3ceb178d29ce17a38888f78b324065f552b0db1195be0623ce227db4
-
SHA512
d6c994cfc93be6bfafa9c239a21e428072766c8393e0653f8f64a6b67eaa4aae2515aff6b5d6c72b56ea3559774b63ffc1626df65860aaf1f207995ba36f617d
Malware Config
Extracted
Family
icedid
C2
spaceprogramm.cloud
Signatures
-
IcedID First Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1220-56-0x00000000754E0000-0x00000000754E6000-memory.dmp IcedidFirstLoader behavioral1/memory/1220-57-0x00000000754E0000-0x000000007551D000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 13 IoCs
Processes:
rundll32.exeflow pid process 3 1220 rundll32.exe 4 1220 rundll32.exe 6 1220 rundll32.exe 7 1220 rundll32.exe 9 1220 rundll32.exe 10 1220 rundll32.exe 12 1220 rundll32.exe 14 1220 rundll32.exe 16 1220 rundll32.exe 17 1220 rundll32.exe 20 1220 rundll32.exe 24 1220 rundll32.exe 25 1220 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 620 wrote to memory of 1220 620 rundll32.exe rundll32.exe PID 620 wrote to memory of 1220 620 rundll32.exe rundll32.exe PID 620 wrote to memory of 1220 620 rundll32.exe rundll32.exe PID 620 wrote to memory of 1220 620 rundll32.exe rundll32.exe PID 620 wrote to memory of 1220 620 rundll32.exe rundll32.exe PID 620 wrote to memory of 1220 620 rundll32.exe rundll32.exe PID 620 wrote to memory of 1220 620 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c49f89af3ceb178d29ce17a38888f78b324065f552b0db1195be0623ce227db4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c49f89af3ceb178d29ce17a38888f78b324065f552b0db1195be0623ce227db4.dll,#12⤵
- Blocklisted process makes network request
PID:1220