Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-09-2024 02:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b7adba4e4d3790c77c477dbe7c757b9c5af74afb8d2a9885c6d845387e820130.dll
Resource
win7-20240708-en
windows7-x64
5 signatures
150 seconds
General
-
Target
b7adba4e4d3790c77c477dbe7c757b9c5af74afb8d2a9885c6d845387e820130.dll
-
Size
180KB
-
MD5
18b4eea323a14205397d17429ed1b7e5
-
SHA1
80bb7fddc3fa0baf4650edf984cd42c159b8d34c
-
SHA256
b7adba4e4d3790c77c477dbe7c757b9c5af74afb8d2a9885c6d845387e820130
-
SHA512
030f83d41d7f98477b709c038effd60f8448560d76fd7d441eea9954d6b4ea37788a0e13fcd12665a0958f5037aba2676d8f350528b0c8ca6162e64061571b69
-
SSDEEP
3072:aCDZ3U6U9IXYZM+4P2vOP5w+hrEI0TmCsb:aCDZ3OCZMOprWQ
Malware Config
Extracted
Family
icedid
C2
loadlisboa.casa
Signatures
-
IcedID First Stage Loader 2 IoCs
resource yara_rule behavioral2/memory/1404-1-0x0000000010000000-0x0000000010381000-memory.dmp IcedidFirstLoader behavioral2/memory/1404-2-0x0000000010000000-0x0000000010381000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 12 IoCs
flow pid Process 32 1404 rundll32.exe 36 1404 rundll32.exe 39 1404 rundll32.exe 42 1404 rundll32.exe 45 1404 rundll32.exe 49 1404 rundll32.exe 56 1404 rundll32.exe 58 1404 rundll32.exe 59 1404 rundll32.exe 62 1404 rundll32.exe 64 1404 rundll32.exe 65 1404 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4028 wrote to memory of 1404 4028 rundll32.exe 83 PID 4028 wrote to memory of 1404 4028 rundll32.exe 83 PID 4028 wrote to memory of 1404 4028 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b7adba4e4d3790c77c477dbe7c757b9c5af74afb8d2a9885c6d845387e820130.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b7adba4e4d3790c77c477dbe7c757b9c5af74afb8d2a9885c6d845387e820130.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:1404
-