Analysis
-
max time kernel
161s -
max time network
177s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-05-2022 22:46
Static task
static1
Behavioral task
behavioral1
Sample
4c35409a87a1f9eef0628245a5b87fa1782dc2c66061d0ec5c4b8690493b0a00.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
4c35409a87a1f9eef0628245a5b87fa1782dc2c66061d0ec5c4b8690493b0a00.dll
-
Size
178KB
-
MD5
9bb918106053983c1c2c369202705c9c
-
SHA1
df352d30ac755b362af741726370c7c32be4e205
-
SHA256
4c35409a87a1f9eef0628245a5b87fa1782dc2c66061d0ec5c4b8690493b0a00
-
SHA512
7a441de0467bc342ab655edb66b912f737189fef4ab7f655a3a8815163d2bc051caad5fba27dc097d68ba9043e8db68c0f07236b24d9347710d93c602d5cd945
Malware Config
Extracted
Family
icedid
C2
qapoloki.cyou
Signatures
-
IcedID First Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1260-56-0x0000000074D70000-0x0000000074DA8000-memory.dmp IcedidFirstLoader behavioral1/memory/1260-57-0x0000000074D70000-0x0000000074D76000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 16 IoCs
Processes:
rundll32.exeflow pid process 3 1260 rundll32.exe 4 1260 rundll32.exe 6 1260 rundll32.exe 7 1260 rundll32.exe 9 1260 rundll32.exe 11 1260 rundll32.exe 13 1260 rundll32.exe 14 1260 rundll32.exe 18 1260 rundll32.exe 19 1260 rundll32.exe 21 1260 rundll32.exe 22 1260 rundll32.exe 23 1260 rundll32.exe 24 1260 rundll32.exe 26 1260 rundll32.exe 27 1260 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1704 wrote to memory of 1260 1704 rundll32.exe rundll32.exe PID 1704 wrote to memory of 1260 1704 rundll32.exe rundll32.exe PID 1704 wrote to memory of 1260 1704 rundll32.exe rundll32.exe PID 1704 wrote to memory of 1260 1704 rundll32.exe rundll32.exe PID 1704 wrote to memory of 1260 1704 rundll32.exe rundll32.exe PID 1704 wrote to memory of 1260 1704 rundll32.exe rundll32.exe PID 1704 wrote to memory of 1260 1704 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c35409a87a1f9eef0628245a5b87fa1782dc2c66061d0ec5c4b8690493b0a00.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c35409a87a1f9eef0628245a5b87fa1782dc2c66061d0ec5c4b8690493b0a00.dll,#12⤵
- Blocklisted process makes network request
PID:1260