Analysis
-
max time kernel
240s -
max time network
241s -
platform
windows10-1703_x64 -
resource
win10-20240214-en -
resource tags
arch:x64arch:x86image:win10-20240214-enlocale:en-usos:windows10-1703-x64system -
submitted
13-03-2024 00:18
Behavioral task
behavioral1
Sample
2024_sample.dll
Resource
win10-20240214-en
3 signatures
300 seconds
General
-
Target
2024_sample.dll
-
Size
15KB
-
MD5
06cc2fdfd408c15a1e16adfb46e8bb38
-
SHA1
585cfc19bdb8dfb92407e917615be1ab9dd523e5
-
SHA256
a3fa68045d0106d6db3d43df6b5997d9034f9f7d2a34148187498e4b504ebf58
-
SHA512
eb11a4b40eb20610f3296af8c8a7c8af5934e10922146fdc524b8212077025ccd22aa69e16aa38af56a86bd49aedc9a36a00a3cb7de3368b194fe9026ebb18d4
-
SSDEEP
192:6P+nM5KC/zxayGc3gzq7YjDaqzJCueT+RfbZne9s6PLRP0tkYGijY5:s5Jxayczq7Yjt9lfle9s6PL16kYGi85
Score
10/10
Malware Config
Extracted
Family
icedid
Campaign
4165079571
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 2 4832 rundll32.exe 5 4832 rundll32.exe 9 4832 rundll32.exe 20 4832 rundll32.exe 23 4832 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4832 rundll32.exe 4832 rundll32.exe