Analysis
-
max time kernel
199s -
max time network
68s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
12-05-2022 12:52
Static task
static1
Behavioral task
behavioral1
Sample
86747b573f7f2f20d75754e073411b56e93515eba22cf5c4307a24059e662b16.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
86747b573f7f2f20d75754e073411b56e93515eba22cf5c4307a24059e662b16.exe
Resource
win10v2004-20220414-en
General
-
Target
86747b573f7f2f20d75754e073411b56e93515eba22cf5c4307a24059e662b16.exe
-
Size
228KB
-
MD5
dd11fb3c9d76df104dd54cab9eabc403
-
SHA1
63f7f1b2281f82bec711ab3dc490abde5a24f288
-
SHA256
86747b573f7f2f20d75754e073411b56e93515eba22cf5c4307a24059e662b16
-
SHA512
1532121e4d03955f5a4c33bd622a5da09357b37448ea923dacf12ca98e77af822de1dc3af3cd773f23d175c9b1cf5c42e914b01dbd150528d62e46b738f01949
Malware Config
Extracted
icedid
Extracted
icedid
3940132575
besitxavier.best
nazifestivo.best
-
auth_var
2
-
url_path
/audio/
Signatures
-
IcedID Second Stage Loader 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1432-55-0x0000000000290000-0x0000000000298000-memory.dmp IcedidSecondLoader behavioral1/memory/1432-59-0x00000000003B0000-0x00000000003B6000-memory.dmp IcedidSecondLoader behavioral1/memory/1432-63-0x0000000000270000-0x0000000000275000-memory.dmp IcedidSecondLoader -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
86747b573f7f2f20d75754e073411b56e93515eba22cf5c4307a24059e662b16.exepid process 1432 86747b573f7f2f20d75754e073411b56e93515eba22cf5c4307a24059e662b16.exe 1432 86747b573f7f2f20d75754e073411b56e93515eba22cf5c4307a24059e662b16.exe