Analysis
-
max time kernel
74s -
max time network
77s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2022, 10:26
Static task
static1
Behavioral task
behavioral1
Sample
b4aa5668cf949f8f4be7172686b16e34.dll
Resource
win7-20220718-en
4 signatures
150 seconds
General
-
Target
b4aa5668cf949f8f4be7172686b16e34.dll
-
Size
110KB
-
MD5
b4aa5668cf949f8f4be7172686b16e34
-
SHA1
8d9acf6c4f520fa920001cbe6ad543516baa190f
-
SHA256
915b2018639da88ed54d45253102e1e14a38ed515b4fe07b571492a400897f76
-
SHA512
a7280d699f2a8c1501804a769170bf58da571ede718f8f941ef4b6932b535f65c82d6a6e237cc3dc261d3c15bc0299cb5eea34cfb8b67c58b15e2fb7bc1cfdf8
Malware Config
Extracted
Family
icedid
Campaign
244156380
C2
garbagewellduno.com
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request 1 IoCs
flow pid Process 2 1012 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1012 rundll32.exe 1012 rundll32.exe