Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
03-05-2022 20:59
Static task
static1
Behavioral task
behavioral1
Sample
f95a8ceb27ce17f5d159d75690fcb1628bf9528331aef2ffe3dac02712b67e48.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
f95a8ceb27ce17f5d159d75690fcb1628bf9528331aef2ffe3dac02712b67e48.dll
-
Size
148KB
-
MD5
bd9df65ccb0f5dda832c56979a33929f
-
SHA1
bccdaeef6f5185f8c41f9feafc743f7a5b56ed14
-
SHA256
f95a8ceb27ce17f5d159d75690fcb1628bf9528331aef2ffe3dac02712b67e48
-
SHA512
ab378d7910c16899f4ede8c12555d629ce4412d68ad7f1cda6e4b88f827b9f44d2438336c3db51b7705146d5ea852961dbe488281f83e4dc0faa7e67ef3af3f1
Malware Config
Extracted
Family
icedid
C2
justiceminister.best
fivejudgescatholic.cyou
Signatures
-
IcedID Second Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2888-131-0x00000000750C0000-0x00000000750C6000-memory.dmp IcedidSecondLoader behavioral2/memory/2888-132-0x00000000750C0000-0x00000000750F9000-memory.dmp IcedidSecondLoader -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 2360 wrote to memory of 2888 2360 rundll32.exe rundll32.exe PID 2360 wrote to memory of 2888 2360 rundll32.exe rundll32.exe PID 2360 wrote to memory of 2888 2360 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f95a8ceb27ce17f5d159d75690fcb1628bf9528331aef2ffe3dac02712b67e48.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f95a8ceb27ce17f5d159d75690fcb1628bf9528331aef2ffe3dac02712b67e48.dll,#12⤵PID:2888