Analysis
-
max time kernel
172s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-05-2022 22:46
Static task
static1
Behavioral task
behavioral1
Sample
c9c2f153c10a1ea0eb914d7902b0866960f0a58459f6f7b5fb29b479a85f3890.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
c9c2f153c10a1ea0eb914d7902b0866960f0a58459f6f7b5fb29b479a85f3890.dll
-
Size
186KB
-
MD5
b3a50b17c5df922ec4a1c3019c33b9c5
-
SHA1
3b186a01d4a8ccc905f08b0672f32a705ae8d036
-
SHA256
c9c2f153c10a1ea0eb914d7902b0866960f0a58459f6f7b5fb29b479a85f3890
-
SHA512
26c0814015940ebc605aae2ed96d7d77d761613451ffb8c9da8cc3f12319800574136368044d1e1f8875fab12e9c62f8bb134e4db29b581763d30547890bbce1
Malware Config
Extracted
Family
icedid
C2
vernerfonbraun.pw
Signatures
-
IcedID First Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2364-131-0x0000000074D10000-0x0000000074D16000-memory.dmp IcedidFirstLoader behavioral2/memory/2364-132-0x0000000074D10000-0x0000000074D57000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 8 IoCs
Processes:
rundll32.exeflow pid process 43 2364 rundll32.exe 46 2364 rundll32.exe 48 2364 rundll32.exe 50 2364 rundll32.exe 56 2364 rundll32.exe 58 2364 rundll32.exe 62 2364 rundll32.exe 64 2364 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3704 wrote to memory of 2364 3704 rundll32.exe rundll32.exe PID 3704 wrote to memory of 2364 3704 rundll32.exe rundll32.exe PID 3704 wrote to memory of 2364 3704 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c9c2f153c10a1ea0eb914d7902b0866960f0a58459f6f7b5fb29b479a85f3890.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c9c2f153c10a1ea0eb914d7902b0866960f0a58459f6f7b5fb29b479a85f3890.dll,#12⤵
- Blocklisted process makes network request
PID:2364