Analysis
-
max time kernel
204s -
max time network
210s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-05-2022 22:46
Static task
static1
Behavioral task
behavioral1
Sample
ec9b2eaa7b73e67019ab5de9ac76dd289232890fa905c3222f98827dafff779e.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
ec9b2eaa7b73e67019ab5de9ac76dd289232890fa905c3222f98827dafff779e.dll
-
Size
178KB
-
MD5
b7d704ebd54a6999619609243f7b5abe
-
SHA1
6275e2c5a16de5bd601a683b53d49bac674590f5
-
SHA256
ec9b2eaa7b73e67019ab5de9ac76dd289232890fa905c3222f98827dafff779e
-
SHA512
7a0076d14ce69f7264bc57de6740bf3e3b41339b20aecc094ac2e76e6e124eaea55550319e7bdca77c4256b3ea554507549132dfec24eb850a80520b11594374
Malware Config
Extracted
Family
icedid
C2
qapoloki.cyou
Signatures
-
IcedID First Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1892-131-0x0000000074B00000-0x0000000074B06000-memory.dmp IcedidFirstLoader behavioral2/memory/1892-132-0x0000000074B00000-0x0000000074B38000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 7 IoCs
Processes:
rundll32.exeflow pid process 22 1892 rundll32.exe 29 1892 rundll32.exe 31 1892 rundll32.exe 35 1892 rundll32.exe 40 1892 rundll32.exe 43 1892 rundll32.exe 48 1892 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4868 wrote to memory of 1892 4868 rundll32.exe rundll32.exe PID 4868 wrote to memory of 1892 4868 rundll32.exe rundll32.exe PID 4868 wrote to memory of 1892 4868 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ec9b2eaa7b73e67019ab5de9ac76dd289232890fa905c3222f98827dafff779e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ec9b2eaa7b73e67019ab5de9ac76dd289232890fa905c3222f98827dafff779e.dll,#12⤵
- Blocklisted process makes network request
PID:1892