Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
24-05-2022 23:23
Static task
static1
Behavioral task
behavioral1
Sample
12f604ac005f97198dead706a057d693ffd158e8349241b82be0918068bb3178.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
12f604ac005f97198dead706a057d693ffd158e8349241b82be0918068bb3178.dll
-
Size
224KB
-
MD5
ff66e4e89f2d839d81f8b6c7ff5923c4
-
SHA1
8e85db0775dc9966cc947c0e45346d713ccf9446
-
SHA256
12f604ac005f97198dead706a057d693ffd158e8349241b82be0918068bb3178
-
SHA512
cb9ff56cd218bc79babae29a13f6ef6be9a71bed778997fca3479ce520799e9834b2f71d8316adbd8ea568be0f72757260370e5e9b853640a2a5a5bbb936dca7
Malware Config
Extracted
Family
icedid
C2
loadberlin.casa
Signatures
-
IcedID First Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4080-131-0x0000000074A30000-0x0000000074A36000-memory.dmp IcedidFirstLoader behavioral2/memory/4080-132-0x0000000074A30000-0x0000000074A74000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 15 IoCs
Processes:
rundll32.exeflow pid process 40 4080 rundll32.exe 41 4080 rundll32.exe 43 4080 rundll32.exe 45 4080 rundll32.exe 47 4080 rundll32.exe 49 4080 rundll32.exe 51 4080 rundll32.exe 53 4080 rundll32.exe 55 4080 rundll32.exe 57 4080 rundll32.exe 59 4080 rundll32.exe 64 4080 rundll32.exe 66 4080 rundll32.exe 69 4080 rundll32.exe 71 4080 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 5004 wrote to memory of 4080 5004 rundll32.exe rundll32.exe PID 5004 wrote to memory of 4080 5004 rundll32.exe rundll32.exe PID 5004 wrote to memory of 4080 5004 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\12f604ac005f97198dead706a057d693ffd158e8349241b82be0918068bb3178.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\12f604ac005f97198dead706a057d693ffd158e8349241b82be0918068bb3178.dll,#12⤵
- Blocklisted process makes network request
PID:4080