Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
07-07-2022 15:56
Static task
static1
Behavioral task
behavioral1
Sample
triage_dropped_file.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
triage_dropped_file.dll
-
Size
534KB
-
MD5
e73bd08a80f0dd8a1a8689b11646f27e
-
SHA1
76e2a4b1ca29d162802fb9a034cb99b4e30a31b3
-
SHA256
01028a8efcec87d9eafe0ce85b8e968e1df97562f2a5e612e5ff92436706684f
-
SHA512
6400582634591ff07fc4fc6dd87745d4528fb7cf6ca6524380a437ac6a20644e3d0f1bc86a367d33c17cabf2dd04a8f7fac05402aaf937807342cc421c9aaf15
Malware Config
Extracted
Family
icedid
Campaign
227378761
C2
blionarywesta.com
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 7 4844 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 4844 rundll32.exe 4844 rundll32.exe