Analysis
-
max time kernel
37s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
01-07-2022 18:27
Static task
static1
Behavioral task
behavioral1
Sample
34585418e4d323e05731edd1d0dbd4fe.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
34585418e4d323e05731edd1d0dbd4fe.dll
-
Size
731KB
-
MD5
34585418e4d323e05731edd1d0dbd4fe
-
SHA1
62a16e8326bfcf308a56b77eaccf4da3fbf6822f
-
SHA256
9b8a1a7f43532922e60292a34bd14f91560b0039772ea9c93691ff806d0795a1
-
SHA512
f456f6a621bb1716bbc6d3cb8329f70709e6dae71088e4df1b0e6a8e142bcc9e3916b37dccbb9801bddb067b31e5b07d7d9313f2767b06490b5159f068276bb8
Malware Config
Extracted
Family
icedid
Campaign
3652318967
C2
yankyhoni.com
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 2 1424 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 1424 rundll32.exe 1424 rundll32.exe