Analysis
-
max time kernel
148s -
max time network
64s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
04-05-2022 07:03
Static task
static1
Behavioral task
behavioral1
Sample
f95a8ceb27ce17f5d159d75690fcb1628bf9528331aef2ffe3dac02712b67e48.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
f95a8ceb27ce17f5d159d75690fcb1628bf9528331aef2ffe3dac02712b67e48.dll
Resource
win10v2004-20220414-en
General
-
Target
f95a8ceb27ce17f5d159d75690fcb1628bf9528331aef2ffe3dac02712b67e48.dll
-
Size
148KB
-
MD5
bd9df65ccb0f5dda832c56979a33929f
-
SHA1
bccdaeef6f5185f8c41f9feafc743f7a5b56ed14
-
SHA256
f95a8ceb27ce17f5d159d75690fcb1628bf9528331aef2ffe3dac02712b67e48
-
SHA512
ab378d7910c16899f4ede8c12555d629ce4412d68ad7f1cda6e4b88f827b9f44d2438336c3db51b7705146d5ea852961dbe488281f83e4dc0faa7e67ef3af3f1
Malware Config
Extracted
icedid
1076950734
justiceminister.best
fivejudgescatholic.cyou
-
auth_var
3
-
url_path
/audio/
Extracted
icedid
Signatures
-
IcedID Second Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1348-56-0x0000000074F40000-0x0000000074F46000-memory.dmp IcedidSecondLoader behavioral1/memory/1348-57-0x0000000074F40000-0x0000000074F79000-memory.dmp IcedidSecondLoader -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1224 wrote to memory of 1348 1224 rundll32.exe rundll32.exe PID 1224 wrote to memory of 1348 1224 rundll32.exe rundll32.exe PID 1224 wrote to memory of 1348 1224 rundll32.exe rundll32.exe PID 1224 wrote to memory of 1348 1224 rundll32.exe rundll32.exe PID 1224 wrote to memory of 1348 1224 rundll32.exe rundll32.exe PID 1224 wrote to memory of 1348 1224 rundll32.exe rundll32.exe PID 1224 wrote to memory of 1348 1224 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f95a8ceb27ce17f5d159d75690fcb1628bf9528331aef2ffe3dac02712b67e48.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f95a8ceb27ce17f5d159d75690fcb1628bf9528331aef2ffe3dac02712b67e48.dll,#12⤵PID:1348