Analysis
-
max time kernel
90s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
28-06-2022 18:51
Static task
static1
Behavioral task
behavioral1
Sample
bb6e595f8913dde111d0e8f1032c7464a1ca153426a87a45cc749fe9e6599d23.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
bb6e595f8913dde111d0e8f1032c7464a1ca153426a87a45cc749fe9e6599d23.dll
-
Size
352KB
-
MD5
09a07ae80aaf96dffca15b4e44fbda49
-
SHA1
23b4b441ccece18f1c638b358828096c7ae6bec8
-
SHA256
bb6e595f8913dde111d0e8f1032c7464a1ca153426a87a45cc749fe9e6599d23
-
SHA512
8cf51ff6909bc4e238ed0e24fac798a41bc56c4412fdb068b2207a3983688a94b4654dbaa1acfaae0b1ff5cf572132a52971bc66edd4ee51316a755bd067a2bf
Malware Config
Extracted
Family
icedid
Campaign
3239568078
C2
carbrownleger.com
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 11 1708 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 1708 rundll32.exe 1708 rundll32.exe