Analysis
-
max time kernel
151s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-05-2022 15:55
Static task
static1
Behavioral task
behavioral1
Sample
9ccafdd6086d5840d792d09183b4f793bebc6a6d2d4068e5f6b1d8d5d96127b4.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
9ccafdd6086d5840d792d09183b4f793bebc6a6d2d4068e5f6b1d8d5d96127b4.dll
-
Size
287KB
-
MD5
42084df2d562de3df92ac9ac107759d8
-
SHA1
d34ef216eba035a681d8adca3698e9b1993aa17b
-
SHA256
9ccafdd6086d5840d792d09183b4f793bebc6a6d2d4068e5f6b1d8d5d96127b4
-
SHA512
0552a9e5ce8ffe014008df75d365d9703eb9c7dc3d6c0793ad31430b2b25d1c817ade4427914f2a228cae739143710fd7333521c73d971b1047e0d3719fea35a
Malware Config
Extracted
Family
icedid
C2
loadpascal.asia
Signatures
-
IcedID First Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1748-56-0x00000000745F0000-0x00000000745F6000-memory.dmp IcedidFirstLoader behavioral1/memory/1748-57-0x00000000745F0000-0x0000000074695000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 20 IoCs
Processes:
rundll32.exeflow pid process 3 1748 rundll32.exe 5 1748 rundll32.exe 7 1748 rundll32.exe 8 1748 rundll32.exe 10 1748 rundll32.exe 11 1748 rundll32.exe 15 1748 rundll32.exe 16 1748 rundll32.exe 18 1748 rundll32.exe 19 1748 rundll32.exe 21 1748 rundll32.exe 22 1748 rundll32.exe 24 1748 rundll32.exe 25 1748 rundll32.exe 27 1748 rundll32.exe 28 1748 rundll32.exe 30 1748 rundll32.exe 31 1748 rundll32.exe 33 1748 rundll32.exe 34 1748 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 968 wrote to memory of 1748 968 rundll32.exe rundll32.exe PID 968 wrote to memory of 1748 968 rundll32.exe rundll32.exe PID 968 wrote to memory of 1748 968 rundll32.exe rundll32.exe PID 968 wrote to memory of 1748 968 rundll32.exe rundll32.exe PID 968 wrote to memory of 1748 968 rundll32.exe rundll32.exe PID 968 wrote to memory of 1748 968 rundll32.exe rundll32.exe PID 968 wrote to memory of 1748 968 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9ccafdd6086d5840d792d09183b4f793bebc6a6d2d4068e5f6b1d8d5d96127b4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9ccafdd6086d5840d792d09183b4f793bebc6a6d2d4068e5f6b1d8d5d96127b4.dll,#12⤵
- Blocklisted process makes network request
PID:1748