Analysis
-
max time kernel
172s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
07-05-2022 21:38
Static task
static1
Behavioral task
behavioral1
Sample
40383cb8cf53f8b9baa508c7e5a7872121d84832131a77107e997cece72e9507.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
40383cb8cf53f8b9baa508c7e5a7872121d84832131a77107e997cece72e9507.dll
-
Size
287KB
-
MD5
283001766ef46c1740ee882afcdbfdca
-
SHA1
8ebeed9b7f198979a4700a0f406050c1d32d3c2d
-
SHA256
40383cb8cf53f8b9baa508c7e5a7872121d84832131a77107e997cece72e9507
-
SHA512
bf3cc6e35c3347ce631bf25a2d9499a02e1fb8449784ecfbf0e6d84433262c33a3e53c79f6f1b22d44bfc6449050488db28840580f6450acf1591edaa47f863d
Malware Config
Extracted
Family
icedid
C2
loadpascal.asia
Signatures
-
IcedID First Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3456-131-0x0000000075360000-0x0000000075405000-memory.dmp IcedidFirstLoader behavioral2/memory/3456-132-0x0000000075360000-0x0000000075366000-memory.dmp IcedidFirstLoader -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4504 wrote to memory of 3456 4504 rundll32.exe rundll32.exe PID 4504 wrote to memory of 3456 4504 rundll32.exe rundll32.exe PID 4504 wrote to memory of 3456 4504 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40383cb8cf53f8b9baa508c7e5a7872121d84832131a77107e997cece72e9507.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40383cb8cf53f8b9baa508c7e5a7872121d84832131a77107e997cece72e9507.dll,#12⤵PID:3456