Analysis
-
max time kernel
139s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
31-05-2022 08:13
Static task
static1
Behavioral task
behavioral1
Sample
2364vg755gh443.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
2364vg755gh443.dll
-
Size
480KB
-
MD5
30735c0ab9596e2452c2793fb64d8a47
-
SHA1
86838f63bd299f1eead9ddff69797d4d613819f8
-
SHA256
9f273a362a97856a64074278ea72672782567ff743d140b839504a841db810c2
-
SHA512
4e64eb287df13e3502418b5a8aadffc810501969658aaa953b1bb4dc8fa302b64d52dbba7795055ba1986980e896fb22f4407c2c74e3b86327f10d7983d5a962
Malware Config
Extracted
Family
icedid
Campaign
2581925242
C2
uleoballs.com
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exeflow pid process 7 4484 rundll32.exe 45 4484 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 4484 rundll32.exe 4484 rundll32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
rundll32.exepid process 4484 rundll32.exe