Analysis
-
max time kernel
153s -
max time network
163s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
03-05-2022 20:59
Static task
static1
Behavioral task
behavioral1
Sample
7fd8eddf1c48476f5c029f79e520bcf30b6e721b0e7df18ab6e9c9af167973b1.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
7fd8eddf1c48476f5c029f79e520bcf30b6e721b0e7df18ab6e9c9af167973b1.dll
-
Size
224KB
-
MD5
0642606a7de23c0aa28be0654f239227
-
SHA1
14c1b53c9d5464071ebe172b3bfea45ec2e909e8
-
SHA256
7fd8eddf1c48476f5c029f79e520bcf30b6e721b0e7df18ab6e9c9af167973b1
-
SHA512
a57177f2d2d6cd7fda10c922246cd53da8864527c69312bf5dc2a9f4302e3c799f5d70e7e3dd1f2a3059a41cba289720b3a41f1bc61b5874bbcd66bd774a4276
Malware Config
Extracted
Family
icedid
C2
loadberlin.casa
Signatures
-
IcedID First Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2016-56-0x00000000753A0000-0x00000000753A6000-memory.dmp IcedidFirstLoader behavioral1/memory/2016-57-0x00000000753A0000-0x00000000753E4000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 18 IoCs
Processes:
rundll32.exeflow pid process 3 2016 rundll32.exe 4 2016 rundll32.exe 6 2016 rundll32.exe 8 2016 rundll32.exe 10 2016 rundll32.exe 11 2016 rundll32.exe 13 2016 rundll32.exe 14 2016 rundll32.exe 16 2016 rundll32.exe 17 2016 rundll32.exe 21 2016 rundll32.exe 22 2016 rundll32.exe 24 2016 rundll32.exe 25 2016 rundll32.exe 27 2016 rundll32.exe 28 2016 rundll32.exe 29 2016 rundll32.exe 30 2016 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2028 wrote to memory of 2016 2028 rundll32.exe rundll32.exe PID 2028 wrote to memory of 2016 2028 rundll32.exe rundll32.exe PID 2028 wrote to memory of 2016 2028 rundll32.exe rundll32.exe PID 2028 wrote to memory of 2016 2028 rundll32.exe rundll32.exe PID 2028 wrote to memory of 2016 2028 rundll32.exe rundll32.exe PID 2028 wrote to memory of 2016 2028 rundll32.exe rundll32.exe PID 2028 wrote to memory of 2016 2028 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7fd8eddf1c48476f5c029f79e520bcf30b6e721b0e7df18ab6e9c9af167973b1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7fd8eddf1c48476f5c029f79e520bcf30b6e721b0e7df18ab6e9c9af167973b1.dll,#12⤵
- Blocklisted process makes network request
PID:2016