Analysis
-
max time kernel
159s -
max time network
172s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-05-2022 22:46
Static task
static1
Behavioral task
behavioral1
Sample
48e69f94c801c87dc65c445d2a61398bc0708e41c78ef70a041d700f32a1dce6.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
48e69f94c801c87dc65c445d2a61398bc0708e41c78ef70a041d700f32a1dce6.dll
-
Size
186KB
-
MD5
70c7108b898eb8b6c058a7c8c2994f96
-
SHA1
1ecc6f1a3f069588c2b25bf130587a0e67bf0997
-
SHA256
48e69f94c801c87dc65c445d2a61398bc0708e41c78ef70a041d700f32a1dce6
-
SHA512
a52afc3fc1bdb105ba8667bd277bb4a61f942ac9cf8fd14d128cbd971124491cac7b7066fbafac5ad7b8a090264c817842b4ff97bfadb411cf1b9ae629487ab2
Malware Config
Extracted
Family
icedid
C2
vernerfonbraun.pw
Signatures
-
IcedID First Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1652-56-0x0000000074680000-0x0000000074686000-memory.dmp IcedidFirstLoader behavioral1/memory/1652-57-0x0000000074680000-0x00000000746C7000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 14 IoCs
Processes:
rundll32.exeflow pid process 3 1652 rundll32.exe 4 1652 rundll32.exe 6 1652 rundll32.exe 7 1652 rundll32.exe 10 1652 rundll32.exe 11 1652 rundll32.exe 13 1652 rundll32.exe 15 1652 rundll32.exe 17 1652 rundll32.exe 18 1652 rundll32.exe 19 1652 rundll32.exe 20 1652 rundll32.exe 22 1652 rundll32.exe 23 1652 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1644 wrote to memory of 1652 1644 rundll32.exe rundll32.exe PID 1644 wrote to memory of 1652 1644 rundll32.exe rundll32.exe PID 1644 wrote to memory of 1652 1644 rundll32.exe rundll32.exe PID 1644 wrote to memory of 1652 1644 rundll32.exe rundll32.exe PID 1644 wrote to memory of 1652 1644 rundll32.exe rundll32.exe PID 1644 wrote to memory of 1652 1644 rundll32.exe rundll32.exe PID 1644 wrote to memory of 1652 1644 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\48e69f94c801c87dc65c445d2a61398bc0708e41c78ef70a041d700f32a1dce6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\48e69f94c801c87dc65c445d2a61398bc0708e41c78ef70a041d700f32a1dce6.dll,#12⤵
- Blocklisted process makes network request
PID:1652