Analysis
-
max time kernel
187s -
max time network
193s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-05-2022 22:46
Static task
static1
Behavioral task
behavioral1
Sample
4753c3ea77bac5552adea41fa924e5e8eb8418362a1513e2262ac5d5dd187c6b.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
4753c3ea77bac5552adea41fa924e5e8eb8418362a1513e2262ac5d5dd187c6b.dll
-
Size
178KB
-
MD5
e9333552aa6f3277e651a75e0f902021
-
SHA1
3eb73ed321842fe294899f2d2e77a5a829c93d90
-
SHA256
4753c3ea77bac5552adea41fa924e5e8eb8418362a1513e2262ac5d5dd187c6b
-
SHA512
f674bddd86937c7e635a56bd1fcb9cfeb8ee76dadc7a5ce141a7111830bfa2b8dacbce87000169e06aa270881f8bbd26019fd1b0bedb01a27fe4588b52e92227
Malware Config
Extracted
Family
icedid
C2
spehanemzu.top
Signatures
-
IcedID First Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1944-56-0x0000000075370000-0x00000000753B0000-memory.dmp IcedidFirstLoader behavioral1/memory/1944-57-0x0000000075370000-0x0000000075376000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 22 IoCs
Processes:
rundll32.exeflow pid process 3 1944 rundll32.exe 5 1944 rundll32.exe 7 1944 rundll32.exe 8 1944 rundll32.exe 10 1944 rundll32.exe 11 1944 rundll32.exe 13 1944 rundll32.exe 14 1944 rundll32.exe 16 1944 rundll32.exe 17 1944 rundll32.exe 21 1944 rundll32.exe 22 1944 rundll32.exe 24 1944 rundll32.exe 25 1944 rundll32.exe 27 1944 rundll32.exe 28 1944 rundll32.exe 30 1944 rundll32.exe 31 1944 rundll32.exe 33 1944 rundll32.exe 34 1944 rundll32.exe 36 1944 rundll32.exe 37 1944 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1660 wrote to memory of 1944 1660 rundll32.exe rundll32.exe PID 1660 wrote to memory of 1944 1660 rundll32.exe rundll32.exe PID 1660 wrote to memory of 1944 1660 rundll32.exe rundll32.exe PID 1660 wrote to memory of 1944 1660 rundll32.exe rundll32.exe PID 1660 wrote to memory of 1944 1660 rundll32.exe rundll32.exe PID 1660 wrote to memory of 1944 1660 rundll32.exe rundll32.exe PID 1660 wrote to memory of 1944 1660 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4753c3ea77bac5552adea41fa924e5e8eb8418362a1513e2262ac5d5dd187c6b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4753c3ea77bac5552adea41fa924e5e8eb8418362a1513e2262ac5d5dd187c6b.dll,#12⤵
- Blocklisted process makes network request
PID:1944