Analysis
-
max time kernel
148s -
max time network
171s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
24-05-2022 23:23
Static task
static1
Behavioral task
behavioral1
Sample
12f604ac005f97198dead706a057d693ffd158e8349241b82be0918068bb3178.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
12f604ac005f97198dead706a057d693ffd158e8349241b82be0918068bb3178.dll
-
Size
224KB
-
MD5
ff66e4e89f2d839d81f8b6c7ff5923c4
-
SHA1
8e85db0775dc9966cc947c0e45346d713ccf9446
-
SHA256
12f604ac005f97198dead706a057d693ffd158e8349241b82be0918068bb3178
-
SHA512
cb9ff56cd218bc79babae29a13f6ef6be9a71bed778997fca3479ce520799e9834b2f71d8316adbd8ea568be0f72757260370e5e9b853640a2a5a5bbb936dca7
Malware Config
Extracted
Family
icedid
C2
loadberlin.casa
Signatures
-
IcedID First Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1504-56-0x0000000074AD0000-0x0000000074B14000-memory.dmp IcedidFirstLoader behavioral1/memory/1504-57-0x0000000074AD0000-0x0000000074AD6000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 18 IoCs
Processes:
rundll32.exeflow pid process 3 1504 rundll32.exe 4 1504 rundll32.exe 6 1504 rundll32.exe 8 1504 rundll32.exe 10 1504 rundll32.exe 11 1504 rundll32.exe 13 1504 rundll32.exe 14 1504 rundll32.exe 16 1504 rundll32.exe 17 1504 rundll32.exe 21 1504 rundll32.exe 22 1504 rundll32.exe 24 1504 rundll32.exe 25 1504 rundll32.exe 27 1504 rundll32.exe 28 1504 rundll32.exe 29 1504 rundll32.exe 30 1504 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 676 wrote to memory of 1504 676 rundll32.exe rundll32.exe PID 676 wrote to memory of 1504 676 rundll32.exe rundll32.exe PID 676 wrote to memory of 1504 676 rundll32.exe rundll32.exe PID 676 wrote to memory of 1504 676 rundll32.exe rundll32.exe PID 676 wrote to memory of 1504 676 rundll32.exe rundll32.exe PID 676 wrote to memory of 1504 676 rundll32.exe rundll32.exe PID 676 wrote to memory of 1504 676 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\12f604ac005f97198dead706a057d693ffd158e8349241b82be0918068bb3178.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\12f604ac005f97198dead706a057d693ffd158e8349241b82be0918068bb3178.dll,#12⤵
- Blocklisted process makes network request
PID:1504