Analysis
-
max time kernel
174s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-05-2022 22:46
Static task
static1
Behavioral task
behavioral1
Sample
4c35409a87a1f9eef0628245a5b87fa1782dc2c66061d0ec5c4b8690493b0a00.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
4c35409a87a1f9eef0628245a5b87fa1782dc2c66061d0ec5c4b8690493b0a00.dll
-
Size
178KB
-
MD5
9bb918106053983c1c2c369202705c9c
-
SHA1
df352d30ac755b362af741726370c7c32be4e205
-
SHA256
4c35409a87a1f9eef0628245a5b87fa1782dc2c66061d0ec5c4b8690493b0a00
-
SHA512
7a441de0467bc342ab655edb66b912f737189fef4ab7f655a3a8815163d2bc051caad5fba27dc097d68ba9043e8db68c0f07236b24d9347710d93c602d5cd945
Malware Config
Extracted
Family
icedid
C2
qapoloki.cyou
Signatures
-
IcedID First Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3064-131-0x0000000075250000-0x0000000075256000-memory.dmp IcedidFirstLoader behavioral2/memory/3064-132-0x0000000075250000-0x0000000075288000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 6 IoCs
Processes:
rundll32.exeflow pid process 31 3064 rundll32.exe 46 3064 rundll32.exe 50 3064 rundll32.exe 72 3064 rundll32.exe 95 3064 rundll32.exe 97 3064 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3112 wrote to memory of 3064 3112 rundll32.exe rundll32.exe PID 3112 wrote to memory of 3064 3112 rundll32.exe rundll32.exe PID 3112 wrote to memory of 3064 3112 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c35409a87a1f9eef0628245a5b87fa1782dc2c66061d0ec5c4b8690493b0a00.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c35409a87a1f9eef0628245a5b87fa1782dc2c66061d0ec5c4b8690493b0a00.dll,#12⤵
- Blocklisted process makes network request
PID:3064