Analysis
-
max time kernel
151s -
max time network
164s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
02-05-2022 15:39
Static task
static1
Behavioral task
behavioral1
Sample
34216fd20582d86021dc492deecd457890a6f7d1c694557708ab7e041671450a.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
34216fd20582d86021dc492deecd457890a6f7d1c694557708ab7e041671450a.dll
-
Size
146KB
-
MD5
019e954706a40e8fdb42c7fcd9402e47
-
SHA1
865eb6b9189998cc66e883bdb3008d09c71d931e
-
SHA256
34216fd20582d86021dc492deecd457890a6f7d1c694557708ab7e041671450a
-
SHA512
c1e2a6cdb2fd41204cee4dc5b3ecc9e37b9c7d9562c8aa784d4d36f96f62506a3cad42bc7231a6e7b2cf30ba768b5f5adebab2bc386fc3db3db855b10174522c
Malware Config
Extracted
Family
icedid
C2
likoncar.cyou
skrepamulan.cyou
Signatures
-
IcedID Second Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1944-56-0x0000000074FB0000-0x0000000074FB6000-memory.dmp IcedidSecondLoader behavioral1/memory/1944-57-0x0000000074FB0000-0x0000000074FE6000-memory.dmp IcedidSecondLoader -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1920 wrote to memory of 1944 1920 rundll32.exe rundll32.exe PID 1920 wrote to memory of 1944 1920 rundll32.exe rundll32.exe PID 1920 wrote to memory of 1944 1920 rundll32.exe rundll32.exe PID 1920 wrote to memory of 1944 1920 rundll32.exe rundll32.exe PID 1920 wrote to memory of 1944 1920 rundll32.exe rundll32.exe PID 1920 wrote to memory of 1944 1920 rundll32.exe rundll32.exe PID 1920 wrote to memory of 1944 1920 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\34216fd20582d86021dc492deecd457890a6f7d1c694557708ab7e041671450a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\34216fd20582d86021dc492deecd457890a6f7d1c694557708ab7e041671450a.dll,#12⤵PID:1944