Analysis
-
max time kernel
154s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
03-05-2022 20:59
Static task
static1
Behavioral task
behavioral1
Sample
7fd8eddf1c48476f5c029f79e520bcf30b6e721b0e7df18ab6e9c9af167973b1.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
7fd8eddf1c48476f5c029f79e520bcf30b6e721b0e7df18ab6e9c9af167973b1.dll
-
Size
224KB
-
MD5
0642606a7de23c0aa28be0654f239227
-
SHA1
14c1b53c9d5464071ebe172b3bfea45ec2e909e8
-
SHA256
7fd8eddf1c48476f5c029f79e520bcf30b6e721b0e7df18ab6e9c9af167973b1
-
SHA512
a57177f2d2d6cd7fda10c922246cd53da8864527c69312bf5dc2a9f4302e3c799f5d70e7e3dd1f2a3059a41cba289720b3a41f1bc61b5874bbcd66bd774a4276
Malware Config
Extracted
Family
icedid
C2
loadberlin.casa
Signatures
-
IcedID First Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4560-131-0x0000000074F40000-0x0000000074F46000-memory.dmp IcedidFirstLoader behavioral2/memory/4560-132-0x0000000074F40000-0x0000000074F84000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 13 IoCs
Processes:
rundll32.exeflow pid process 49 4560 rundll32.exe 50 4560 rundll32.exe 52 4560 rundll32.exe 56 4560 rundll32.exe 58 4560 rundll32.exe 60 4560 rundll32.exe 62 4560 rundll32.exe 64 4560 rundll32.exe 66 4560 rundll32.exe 68 4560 rundll32.exe 70 4560 rundll32.exe 73 4560 rundll32.exe 77 4560 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 5052 wrote to memory of 4560 5052 rundll32.exe rundll32.exe PID 5052 wrote to memory of 4560 5052 rundll32.exe rundll32.exe PID 5052 wrote to memory of 4560 5052 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7fd8eddf1c48476f5c029f79e520bcf30b6e721b0e7df18ab6e9c9af167973b1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7fd8eddf1c48476f5c029f79e520bcf30b6e721b0e7df18ab6e9c9af167973b1.dll,#12⤵
- Blocklisted process makes network request
PID:4560