Analysis
-
max time kernel
45s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
11-07-2022 21:07
Static task
static1
Behavioral task
behavioral1
Sample
70a77cba551b3da99055b9fa3ae13b88.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
70a77cba551b3da99055b9fa3ae13b88.dll
-
Size
815KB
-
MD5
70a77cba551b3da99055b9fa3ae13b88
-
SHA1
688586d80c1b2eebfc0717dd050b6c49d9a33bd6
-
SHA256
1ffe7ef56875c38cc32cfb61572096c83cfdae2d9014020c098c69d772c581df
-
SHA512
a53745daa132353ea7c1ae17b501b62732860985ba4b7670af40a8f34fd01bb1b7c895864142d0c2c3964acce5be34c6dc8b134ce8d3371b70719f8c9f03d64e
Malware Config
Extracted
Family
icedid
Campaign
4105767744
C2
frodupshopping.com
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 2 1600 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 1600 rundll32.exe 1600 rundll32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1600-54-0x0000000180000000-0x0000000180009000-memory.dmpFilesize
36KB