Analysis
-
max time kernel
157s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
02/07/2023, 19:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Malicious_425689b74f802308d62b4e55a6c580a7c4365e1263c8856d84ce5c0c967d74ea.dll
Resource
win7-20230621-en
3 signatures
150 seconds
General
-
Target
Malicious_425689b74f802308d62b4e55a6c580a7c4365e1263c8856d84ce5c0c967d74ea.dll
-
Size
64KB
-
MD5
4016288aad26279ab07b6f483e27662c
-
SHA1
764c8dbbe6874a7d89697f823383ef65a2369de2
-
SHA256
425689b74f802308d62b4e55a6c580a7c4365e1263c8856d84ce5c0c967d74ea
-
SHA512
74f254efed7c5cce3ec3a0f600c91c39f98da76ce0f2f449f972c5f9d4e30310261555d86b6e860cb6f8d2379ee7a2455d11096e90f97f29bc474a0fcdc45b50
-
SSDEEP
1536:roBHSfku/TguqNKM6C6E+YUv3EXmYOiKsU:roBS8Q0R68Xys
Malware Config
Extracted
Family
icedid
Campaign
2046050
C2
calldivorce.fun
Signatures
-
IcedID First Stage Loader 1 IoCs
resource yara_rule behavioral2/memory/3584-134-0x0000000002BE0000-0x0000000002BE7000-memory.dmp IcedidFirstLoader -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3584 regsvr32.exe 3584 regsvr32.exe