Analysis
-
max time kernel
178s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
02-07-2023 19:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Malicious_0fed2eee48f0c519ebeae287b1fb667c2ea217def78caa09c75669e003af8a35.dll
Resource
win7-20230621-en
windows7-x64
3 signatures
150 seconds
General
-
Target
Malicious_0fed2eee48f0c519ebeae287b1fb667c2ea217def78caa09c75669e003af8a35.dll
-
Size
64KB
-
MD5
1e896978b012441fa0ab26c19ac04075
-
SHA1
4b9bc68dc255a4ab0ef1ef3f347b12b28c246024
-
SHA256
0fed2eee48f0c519ebeae287b1fb667c2ea217def78caa09c75669e003af8a35
-
SHA512
75fc06813722ef604e6ac05b0c63e581c46dc7f9aaa804e2ba6860e5b1efd03f52237871d2295aa72318f0a72d62c130d7edfbfac026ebd0359b29af32aa3d2a
-
SSDEEP
1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys
Malware Config
Extracted
Family
icedid
Campaign
2046050
C2
calldivorce.fun
Signatures
-
IcedID First Stage Loader 2 IoCs
resource yara_rule behavioral2/memory/1208-133-0x0000000001360000-0x0000000001367000-memory.dmp IcedidFirstLoader behavioral2/memory/1208-134-0x0000000001360000-0x0000000001367000-memory.dmp IcedidFirstLoader -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1208 regsvr32.exe 1208 regsvr32.exe