Analysis
-
max time kernel
172s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 03:16
Static task
static1
Behavioral task
behavioral1
Sample
870943b7e5f58722ed20aa8c05e23b37725b7b759ada2f4096bc6fbbd6afe672.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
870943b7e5f58722ed20aa8c05e23b37725b7b759ada2f4096bc6fbbd6afe672.exe
-
Size
236KB
-
MD5
02536494a006aae678ac0c2134c72915
-
SHA1
759606e6ce70ebbe2b9c58bf7d80ab0721da3efe
-
SHA256
870943b7e5f58722ed20aa8c05e23b37725b7b759ada2f4096bc6fbbd6afe672
-
SHA512
46635664f20f45a96ea37e3b90fcaf13114b022898300ffd74063a04bb429f142b2d71ac5d0b3f0032a7692843ce333cf66599b3fb0a1aa225e614c60570fcae
Malware Config
Extracted
Family
icedid
C2
loadfifth.com
Signatures
-
IcedID First Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4664-130-0x00000000024B0000-0x00000000024B6000-memory.dmp IcedidFirstLoader behavioral2/memory/4664-133-0x00000000024A0000-0x00000000024A3000-memory.dmp IcedidFirstLoader -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
870943b7e5f58722ed20aa8c05e23b37725b7b759ada2f4096bc6fbbd6afe672.exepid process 4664 870943b7e5f58722ed20aa8c05e23b37725b7b759ada2f4096bc6fbbd6afe672.exe 4664 870943b7e5f58722ed20aa8c05e23b37725b7b759ada2f4096bc6fbbd6afe672.exe