Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
29-06-2022 15:15
Static task
static1
Behavioral task
behavioral1
Sample
s4pesa/documents.lnk
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
s4pesa/documents.lnk
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
Behavioral task
behavioral3
Sample
s4pesa/s4pesa.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
s4pesa/s4pesa.dll
-
Size
731KB
-
MD5
4259380320bcfe7d3065f0e82257e36c
-
SHA1
39e0b78813cb2b7f337338375469efad9ba2a79e
-
SHA256
8522e424d1742369c5e2700d194ad5d53d91b4864c3fddd74ac630b4249c1a87
-
SHA512
9137960f54302c4dfdd6bab68b977ca4649461c209d583a0c2e284d8b056cfc316d447570a3c8c1d6422a8d93c0bea217210e4f81cc3fb518148b70f750b3195
Malware Config
Extracted
Family
icedid
Campaign
3652318967
C2
yankyhoni.com
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 2 532 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 532 rundll32.exe 532 rundll32.exe