Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
12-11-2022 10:14
Static task
static1
Behavioral task
behavioral1
Sample
maximally.tmp.dll
Resource
win7-20220812-en
windows7-x64
3 signatures
150 seconds
General
-
Target
maximally.tmp.dll
-
Size
91KB
-
MD5
973c90300aac68b64fdcc53eea3e3042
-
SHA1
5deea28b7446c6e7f181068db1c10eb6b4db5a0a
-
SHA256
8f11dedd768f84aca417415ac6aafbae2ce6fcb52e5faf19f348c4b71f87522a
-
SHA512
78da61c6c6c8481d31caf6b0ff900c21f7fb5957a9410ae29ac3cc6a93e8574c807d71a1ad7490f09e89a93255be54c571b99244b2a79805594372ad06665c73
-
SSDEEP
1536:Zet0Ij7MlNXRNRLCRw8FBR0Q6xpeweizs2Xm9+WROCzXiSLuhSiy:JInMX7GweBW/0weN22briS4M
Malware Config
Extracted
Family
icedid
Campaign
426369791
C2
ahilacarstrupert.com
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exeflow pid process 24 4112 rundll32.exe 71 4112 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 4112 rundll32.exe 4112 rundll32.exe