Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-01-2023 09:24
Static task
static1
Behavioral task
behavioral1
Sample
problem_2.dll
Resource
win7-20221111-en
windows7-x64
4 signatures
150 seconds
General
-
Target
problem_2.dll
-
Size
178KB
-
MD5
0defacf9edf30d2f5abe16fef26d92ac
-
SHA1
1d0e229fe28c42cf25f4f688bad9925864a08193
-
SHA256
800e53e7acb97419f42d8c82e9c34a2810ebbbe98058f580719ab83e70be435c
-
SHA512
5f98b4fa840da710af2581fc91999596cfe10d0fc3eb25922cd5d13669abeb070169e95fe9690010d085da34f09fe0c873266b948eab3d1dada3a47571b61e6a
-
SSDEEP
3072:dRNOtBIEa2A/k3xTCD4xugYOpddiT+t1xLyRlu94OApLnjWEV2rdSu:rNQIEaH/W80xugYOpHiT+t10Rlu943kd
Malware Config
Extracted
Family
icedid
C2
qapoloki.cyou
Signatures
-
IcedID First Stage Loader 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2032-56-0x0000000074900000-0x0000000074906000-memory.dmp IcedidFirstLoader behavioral1/memory/2032-57-0x0000000074900000-0x0000000074938000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 28 IoCs
Processes:
rundll32.exeflow pid process 3 2032 rundll32.exe 4 2032 rundll32.exe 6 2032 rundll32.exe 7 2032 rundll32.exe 9 2032 rundll32.exe 10 2032 rundll32.exe 12 2032 rundll32.exe 13 2032 rundll32.exe 17 2032 rundll32.exe 18 2032 rundll32.exe 20 2032 rundll32.exe 21 2032 rundll32.exe 22 2032 rundll32.exe 23 2032 rundll32.exe 25 2032 rundll32.exe 26 2032 rundll32.exe 28 2032 rundll32.exe 29 2032 rundll32.exe 31 2032 rundll32.exe 32 2032 rundll32.exe 34 2032 rundll32.exe 35 2032 rundll32.exe 36 2032 rundll32.exe 37 2032 rundll32.exe 39 2032 rundll32.exe 40 2032 rundll32.exe 42 2032 rundll32.exe 43 2032 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1776 wrote to memory of 2032 1776 rundll32.exe rundll32.exe PID 1776 wrote to memory of 2032 1776 rundll32.exe rundll32.exe PID 1776 wrote to memory of 2032 1776 rundll32.exe rundll32.exe PID 1776 wrote to memory of 2032 1776 rundll32.exe rundll32.exe PID 1776 wrote to memory of 2032 1776 rundll32.exe rundll32.exe PID 1776 wrote to memory of 2032 1776 rundll32.exe rundll32.exe PID 1776 wrote to memory of 2032 1776 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\problem_2.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\problem_2.dll,#12⤵
- Blocklisted process makes network request
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2032-54-0x0000000000000000-mapping.dmp
-
memory/2032-55-0x00000000753F1000-0x00000000753F3000-memory.dmpFilesize
8KB
-
memory/2032-56-0x0000000074900000-0x0000000074906000-memory.dmpFilesize
24KB
-
memory/2032-57-0x0000000074900000-0x0000000074938000-memory.dmpFilesize
224KB