Analysis
-
max time kernel
137s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
11-07-2022 15:36
Static task
static1
Behavioral task
behavioral1
Sample
3d90bd7d3a652090693571c901ba7234.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
3d90bd7d3a652090693571c901ba7234.dll
-
Size
813KB
-
MD5
3d90bd7d3a652090693571c901ba7234
-
SHA1
b1c1c40a877745cbd300d9b952eda2c657b103f3
-
SHA256
7be9d46382e6b03c2d29f85755e10fdc755a91c7d646331214a3717c8259f120
-
SHA512
e37f1567b94f0ec05a23b85edfe1936bf8dbf0bff9b6a5ae8f0798ef60aae77206810980bdb9103d76823370b8b2488aadba68702501724c21568950e8f465ed
Malware Config
Extracted
Family
icedid
Campaign
4105767744
C2
frodupshopping.com
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exeflow pid process 13 3844 rundll32.exe 58 3844 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 3844 rundll32.exe 3844 rundll32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3844-130-0x0000000180000000-0x0000000180009000-memory.dmpFilesize
36KB