Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
04-05-2022 07:03
Static task
static1
Behavioral task
behavioral1
Sample
f95a8ceb27ce17f5d159d75690fcb1628bf9528331aef2ffe3dac02712b67e48.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
f95a8ceb27ce17f5d159d75690fcb1628bf9528331aef2ffe3dac02712b67e48.dll
Resource
win10v2004-20220414-en
General
-
Target
f95a8ceb27ce17f5d159d75690fcb1628bf9528331aef2ffe3dac02712b67e48.dll
-
Size
148KB
-
MD5
bd9df65ccb0f5dda832c56979a33929f
-
SHA1
bccdaeef6f5185f8c41f9feafc743f7a5b56ed14
-
SHA256
f95a8ceb27ce17f5d159d75690fcb1628bf9528331aef2ffe3dac02712b67e48
-
SHA512
ab378d7910c16899f4ede8c12555d629ce4412d68ad7f1cda6e4b88f827b9f44d2438336c3db51b7705146d5ea852961dbe488281f83e4dc0faa7e67ef3af3f1
Malware Config
Extracted
icedid
1076950734
justiceminister.best
fivejudgescatholic.cyou
-
auth_var
3
-
url_path
/audio/
Extracted
icedid
Signatures
-
IcedID Second Stage Loader 2 IoCs
resource yara_rule behavioral2/memory/4828-131-0x0000000075430000-0x0000000075436000-memory.dmp IcedidSecondLoader behavioral2/memory/4828-132-0x0000000075430000-0x0000000075469000-memory.dmp IcedidSecondLoader -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4216 wrote to memory of 4828 4216 rundll32.exe 82 PID 4216 wrote to memory of 4828 4216 rundll32.exe 82 PID 4216 wrote to memory of 4828 4216 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f95a8ceb27ce17f5d159d75690fcb1628bf9528331aef2ffe3dac02712b67e48.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f95a8ceb27ce17f5d159d75690fcb1628bf9528331aef2ffe3dac02712b67e48.dll,#12⤵PID:4828
-