Analysis
-
max time kernel
169s -
max time network
177s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
03-05-2022 00:21
Static task
static1
Behavioral task
behavioral1
Sample
a2eac98f26c51e5dcdf78e707098297de8564d73200341512ad71cf9a3f7bbab.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
a2eac98f26c51e5dcdf78e707098297de8564d73200341512ad71cf9a3f7bbab.dll
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
a2eac98f26c51e5dcdf78e707098297de8564d73200341512ad71cf9a3f7bbab.dll
-
Size
278KB
-
MD5
81726d9479ed369c2477144116123ae7
-
SHA1
014225d2e82587f4d34fe7e9adec6f0b9d9adb49
-
SHA256
a2eac98f26c51e5dcdf78e707098297de8564d73200341512ad71cf9a3f7bbab
-
SHA512
9b1b795dc53e9895f8c47a50c4aaf6e9f68c3636546735e634e6b6b758625d2d930bf571bd087a79ba4db48f9a111daf7dbabfa03aa8d7b69589da01edfd1aec
Score
10/10
Malware Config
Extracted
Family
icedid
Botnet
2398486359
C2
kravynolu.cyou
nikushotomo.cyou
Attributes
-
auth_var
1
-
url_path
/audio/
Extracted
Family
icedid
Signatures
-
IcedID Second Stage Loader 2 IoCs
resource yara_rule behavioral1/memory/884-56-0x00000000746F0000-0x00000000746F6000-memory.dmp IcedidSecondLoader behavioral1/memory/884-57-0x00000000746F0000-0x0000000074743000-memory.dmp IcedidSecondLoader -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1936 wrote to memory of 884 1936 rundll32.exe 27 PID 1936 wrote to memory of 884 1936 rundll32.exe 27 PID 1936 wrote to memory of 884 1936 rundll32.exe 27 PID 1936 wrote to memory of 884 1936 rundll32.exe 27 PID 1936 wrote to memory of 884 1936 rundll32.exe 27 PID 1936 wrote to memory of 884 1936 rundll32.exe 27 PID 1936 wrote to memory of 884 1936 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a2eac98f26c51e5dcdf78e707098297de8564d73200341512ad71cf9a3f7bbab.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a2eac98f26c51e5dcdf78e707098297de8564d73200341512ad71cf9a3f7bbab.dll,#12⤵PID:884
-