Analysis
-
max time kernel
148s -
max time network
212s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-05-2022 21:38
Static task
static1
Behavioral task
behavioral1
Sample
40383cb8cf53f8b9baa508c7e5a7872121d84832131a77107e997cece72e9507.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
40383cb8cf53f8b9baa508c7e5a7872121d84832131a77107e997cece72e9507.dll
-
Size
287KB
-
MD5
283001766ef46c1740ee882afcdbfdca
-
SHA1
8ebeed9b7f198979a4700a0f406050c1d32d3c2d
-
SHA256
40383cb8cf53f8b9baa508c7e5a7872121d84832131a77107e997cece72e9507
-
SHA512
bf3cc6e35c3347ce631bf25a2d9499a02e1fb8449784ecfbf0e6d84433262c33a3e53c79f6f1b22d44bfc6449050488db28840580f6450acf1591edaa47f863d
Malware Config
Extracted
Family
icedid
C2
loadpascal.asia
Signatures
-
IcedID First Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1344-56-0x00000000750C0000-0x00000000750C6000-memory.dmp IcedidFirstLoader behavioral1/memory/1344-57-0x00000000750C0000-0x0000000075165000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 10 IoCs
Processes:
rundll32.exeflow pid process 3 1344 rundll32.exe 5 1344 rundll32.exe 7 1344 rundll32.exe 8 1344 rundll32.exe 10 1344 rundll32.exe 11 1344 rundll32.exe 15 1344 rundll32.exe 16 1344 rundll32.exe 18 1344 rundll32.exe 19 1344 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1284 wrote to memory of 1344 1284 rundll32.exe rundll32.exe PID 1284 wrote to memory of 1344 1284 rundll32.exe rundll32.exe PID 1284 wrote to memory of 1344 1284 rundll32.exe rundll32.exe PID 1284 wrote to memory of 1344 1284 rundll32.exe rundll32.exe PID 1284 wrote to memory of 1344 1284 rundll32.exe rundll32.exe PID 1284 wrote to memory of 1344 1284 rundll32.exe rundll32.exe PID 1284 wrote to memory of 1344 1284 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40383cb8cf53f8b9baa508c7e5a7872121d84832131a77107e997cece72e9507.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40383cb8cf53f8b9baa508c7e5a7872121d84832131a77107e997cece72e9507.dll,#12⤵
- Blocklisted process makes network request
PID:1344