Analysis
-
max time kernel
197s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-05-2022 22:46
Static task
static1
Behavioral task
behavioral1
Sample
c6dec41788f2e709c8908e0e934a20b5b8a6712dc742bdac4bb4131bfa6ee2f9.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
c6dec41788f2e709c8908e0e934a20b5b8a6712dc742bdac4bb4131bfa6ee2f9.dll
-
Size
186KB
-
MD5
117704e30859c562e861b640332d7cdd
-
SHA1
820c3d83acd046388f8e51f55ec57259f0d1d578
-
SHA256
c6dec41788f2e709c8908e0e934a20b5b8a6712dc742bdac4bb4131bfa6ee2f9
-
SHA512
947cc9abd677892d9494a5f6902b6c0ac7b32c8749511c57ff0d4731ecb40fbf2e89f17739b51a2006ff9bd01d5732533059bf89359107afc732e42f885c1d8a
Malware Config
Extracted
Family
icedid
C2
vernerfonbraun.pw
Signatures
-
IcedID First Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2892-131-0x0000000075850000-0x0000000075856000-memory.dmp IcedidFirstLoader behavioral2/memory/2892-132-0x0000000075850000-0x0000000075897000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 6 IoCs
Processes:
rundll32.exeflow pid process 55 2892 rundll32.exe 69 2892 rundll32.exe 72 2892 rundll32.exe 74 2892 rundll32.exe 89 2892 rundll32.exe 91 2892 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3408 wrote to memory of 2892 3408 rundll32.exe rundll32.exe PID 3408 wrote to memory of 2892 3408 rundll32.exe rundll32.exe PID 3408 wrote to memory of 2892 3408 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c6dec41788f2e709c8908e0e934a20b5b8a6712dc742bdac4bb4131bfa6ee2f9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c6dec41788f2e709c8908e0e934a20b5b8a6712dc742bdac4bb4131bfa6ee2f9.dll,#12⤵
- Blocklisted process makes network request
PID:2892