Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02-09-2024 02:59
Static task
static1
Behavioral task
behavioral1
Sample
b7adba4e4d3790c77c477dbe7c757b9c5af74afb8d2a9885c6d845387e820130.dll
Resource
win7-20240708-en
General
-
Target
b7adba4e4d3790c77c477dbe7c757b9c5af74afb8d2a9885c6d845387e820130.dll
-
Size
180KB
-
MD5
18b4eea323a14205397d17429ed1b7e5
-
SHA1
80bb7fddc3fa0baf4650edf984cd42c159b8d34c
-
SHA256
b7adba4e4d3790c77c477dbe7c757b9c5af74afb8d2a9885c6d845387e820130
-
SHA512
030f83d41d7f98477b709c038effd60f8448560d76fd7d441eea9954d6b4ea37788a0e13fcd12665a0958f5037aba2676d8f350528b0c8ca6162e64061571b69
-
SSDEEP
3072:aCDZ3U6U9IXYZM+4P2vOP5w+hrEI0TmCsb:aCDZ3OCZMOprWQ
Malware Config
Extracted
icedid
loadlisboa.casa
Signatures
-
IcedID First Stage Loader 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2004-2-0x0000000010000000-0x0000000010381000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 34 IoCs
Processes:
rundll32.exeflow pid process 3 2004 rundll32.exe 4 2004 rundll32.exe 6 2004 rundll32.exe 7 2004 rundll32.exe 9 2004 rundll32.exe 10 2004 rundll32.exe 12 2004 rundll32.exe 13 2004 rundll32.exe 17 2004 rundll32.exe 18 2004 rundll32.exe 20 2004 rundll32.exe 21 2004 rundll32.exe 23 2004 rundll32.exe 24 2004 rundll32.exe 26 2004 rundll32.exe 27 2004 rundll32.exe 28 2004 rundll32.exe 29 2004 rundll32.exe 31 2004 rundll32.exe 32 2004 rundll32.exe 34 2004 rundll32.exe 35 2004 rundll32.exe 37 2004 rundll32.exe 38 2004 rundll32.exe 40 2004 rundll32.exe 41 2004 rundll32.exe 42 2004 rundll32.exe 43 2004 rundll32.exe 45 2004 rundll32.exe 46 2004 rundll32.exe 48 2004 rundll32.exe 49 2004 rundll32.exe 51 2004 rundll32.exe 52 2004 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2212 wrote to memory of 2004 2212 rundll32.exe rundll32.exe PID 2212 wrote to memory of 2004 2212 rundll32.exe rundll32.exe PID 2212 wrote to memory of 2004 2212 rundll32.exe rundll32.exe PID 2212 wrote to memory of 2004 2212 rundll32.exe rundll32.exe PID 2212 wrote to memory of 2004 2212 rundll32.exe rundll32.exe PID 2212 wrote to memory of 2004 2212 rundll32.exe rundll32.exe PID 2212 wrote to memory of 2004 2212 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b7adba4e4d3790c77c477dbe7c757b9c5af74afb8d2a9885c6d845387e820130.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b7adba4e4d3790c77c477dbe7c757b9c5af74afb8d2a9885c6d845387e820130.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2004
-