Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 20:11
Static task
static1
Behavioral task
behavioral1
Sample
f8ecc92f33c4ee1ab8dc00f3fdabefe0a37dc16d04e74387af1061c48ec6e67a.dll
Resource
win7-20240708-en
General
-
Target
f8ecc92f33c4ee1ab8dc00f3fdabefe0a37dc16d04e74387af1061c48ec6e67a.dll
-
Size
226KB
-
MD5
38c99fb72368c325da6b5864f3198224
-
SHA1
ea7c1c00caeaa5c93e1e7934ee2d02b366dc5ad0
-
SHA256
f8ecc92f33c4ee1ab8dc00f3fdabefe0a37dc16d04e74387af1061c48ec6e67a
-
SHA512
cc17a1478f06986656197bf4ab813b0597dc87aa3a5718ee0c13c7ea6a607ad3d4f552d001fd6028ee1d7d68c456dbcfd1f2f30a4b230e85d36635b02c7cb97b
-
SSDEEP
3072:f0886/5LxR1GyosDfWuJxC62D3TfqwcS7tJQIdv1Jx+1yY1kszj9mhay3RW:fn8SLxjNn2D3TfHv7pdAkq903R
Malware Config
Extracted
icedid
Signatures
-
Icedid family
-
IcedID Second Stage Loader 1 IoCs
resource yara_rule behavioral1/memory/1928-2-0x0000000074F80000-0x000000007501D000-memory.dmp IcedidSecondLoader -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1380 wrote to memory of 1928 1380 rundll32.exe 30 PID 1380 wrote to memory of 1928 1380 rundll32.exe 30 PID 1380 wrote to memory of 1928 1380 rundll32.exe 30 PID 1380 wrote to memory of 1928 1380 rundll32.exe 30 PID 1380 wrote to memory of 1928 1380 rundll32.exe 30 PID 1380 wrote to memory of 1928 1380 rundll32.exe 30 PID 1380 wrote to memory of 1928 1380 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f8ecc92f33c4ee1ab8dc00f3fdabefe0a37dc16d04e74387af1061c48ec6e67a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f8ecc92f33c4ee1ab8dc00f3fdabefe0a37dc16d04e74387af1061c48ec6e67a.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1928
-