Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
14-06-2022 19:29
Static task
static1
Behavioral task
behavioral1
Sample
dar.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
dar.dll
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
dar.dll
-
Size
147KB
-
MD5
4a6ceabb2ce1b486398c254a5503b792
-
SHA1
08a1c43bd1c63bbea864133d2923755aa2f74440
-
SHA256
4a76a28498b7f391cdc2be73124b4225497232540247ca3662abd9ab2210be36
-
SHA512
a7266dbfee0689fe9386686a6f892055fffb15f5c11e77bf6591ded82a00b884da9b13ce5a7f29c827ae91018d9f7e71e2e6abb99050da3419154ae1edf77394
Score
10/10
Malware Config
Extracted
Family
icedid
Campaign
3529509686
C2
oceriesfornot.top
Signatures
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
regsvr32.exetaskmgr.exepid process 1356 regsvr32.exe 1356 regsvr32.exe 112 taskmgr.exe 112 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
taskmgr.exedescription pid process Token: SeDebugPrivilege 112 taskmgr.exe Token: SeSystemProfilePrivilege 112 taskmgr.exe Token: SeCreateGlobalPrivilege 112 taskmgr.exe Token: 33 112 taskmgr.exe Token: SeIncBasePriorityPrivilege 112 taskmgr.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
Processes:
taskmgr.exepid process 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe -
Suspicious use of SendNotifyMessage 28 IoCs
Processes:
taskmgr.exepid process 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe 112 taskmgr.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\dar.dll1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1356
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:112
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1452