Analysis
-
max time kernel
99s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
04-07-2022 18:46
Static task
static1
Behavioral task
behavioral1
Sample
142a3728163f77b549c0fc8d992f174f.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
142a3728163f77b549c0fc8d992f174f.dll
-
Size
424KB
-
MD5
142a3728163f77b549c0fc8d992f174f
-
SHA1
b62cf796be55d8358a1f8084139416ac44e4200b
-
SHA256
5c09475656153526e907694394641f8126d57176e8d4a4aecb52731c7136e630
-
SHA512
557e9f0883138118f3ee5e19aa090e26abe1c80d73a9d791c9362093a9f6b52fe85e29009fd327bf143fee7d6579aa25bfa13614ab54a9b9f8cc872770f46ac4
Malware Config
Extracted
Family
icedid
Campaign
3635541348
C2
piponareatna.com
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 13 3888 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 3888 rundll32.exe 3888 rundll32.exe