Analysis
-
max time kernel
145s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
07-07-2022 17:17
Static task
static1
General
-
Target
e7e9740829bdbeb57656b59c8295752a9e0b47a1fa193c09392170a6f368bb5f.dll
-
Size
534KB
-
MD5
690b0bf1346c97dfd5e1fe7e9eff22da
-
SHA1
7f6af099f6eda199e240e525a070627c0598a55b
-
SHA256
e7e9740829bdbeb57656b59c8295752a9e0b47a1fa193c09392170a6f368bb5f
-
SHA512
acba2c9907be1cc4d76877294729c8bed71ca72dcec83fc1fb5fa0a5408a7d48372cc017ad59bd368dbe4c75ba28a243cd6b16d76d0005a7b1e66c64cd9e4bca
Malware Config
Extracted
Family
icedid
Campaign
227378761
C2
blionarywesta.com
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exeflow pid process 7 3672 rundll32.exe 40 3672 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 3672 rundll32.exe 3672 rundll32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3672-130-0x0000000180000000-0x0000000180009000-memory.dmpFilesize
36KB