Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-05-2022 15:55
Static task
static1
Behavioral task
behavioral1
Sample
2443e2650a14ab28210e18bdb906646279a03799edace5d2cb648eef2b179842.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
2443e2650a14ab28210e18bdb906646279a03799edace5d2cb648eef2b179842.dll
-
Size
287KB
-
MD5
ae52c1b6b07abf7ebdc21931f23fa50c
-
SHA1
0bd8e7d5f59dec11839420cb0efa194b7029fd54
-
SHA256
2443e2650a14ab28210e18bdb906646279a03799edace5d2cb648eef2b179842
-
SHA512
fa9ecc0dee08106858565d67649e4f53659a751eff15db4344ca1a17c8969401467569f5df202975fd000d3af8e1cb6dcfc21ffaf96b078dcc2028d3cf29473c
Malware Config
Extracted
Family
icedid
C2
loadpascal.asia
Signatures
-
IcedID First Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1476-131-0x00000000749D0000-0x0000000074A75000-memory.dmp IcedidFirstLoader behavioral2/memory/1476-132-0x00000000749D0000-0x00000000749D6000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 14 IoCs
Processes:
rundll32.exeflow pid process 49 1476 rundll32.exe 68 1476 rundll32.exe 74 1476 rundll32.exe 76 1476 rundll32.exe 83 1476 rundll32.exe 85 1476 rundll32.exe 90 1476 rundll32.exe 92 1476 rundll32.exe 94 1476 rundll32.exe 96 1476 rundll32.exe 104 1476 rundll32.exe 106 1476 rundll32.exe 109 1476 rundll32.exe 111 1476 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 2164 wrote to memory of 1476 2164 rundll32.exe rundll32.exe PID 2164 wrote to memory of 1476 2164 rundll32.exe rundll32.exe PID 2164 wrote to memory of 1476 2164 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2443e2650a14ab28210e18bdb906646279a03799edace5d2cb648eef2b179842.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2443e2650a14ab28210e18bdb906646279a03799edace5d2cb648eef2b179842.dll,#12⤵
- Blocklisted process makes network request
PID:1476