Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2025, 10:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f7caed3ce87cbdba9e6cbf93cf483424bfe7a43f47a820679ec4598cf3ed70c1.dll
Resource
win7-20240903-en
6 signatures
120 seconds
General
-
Target
f7caed3ce87cbdba9e6cbf93cf483424bfe7a43f47a820679ec4598cf3ed70c1.dll
-
Size
180KB
-
MD5
31b39dbbf77406ced577c5b9e71c6a83
-
SHA1
f3c38e32e814ecabd06a0b1c6fa4f419b0d81eb8
-
SHA256
f7caed3ce87cbdba9e6cbf93cf483424bfe7a43f47a820679ec4598cf3ed70c1
-
SHA512
922c7102f0e9f7528e6c934fc26ac5e0c2b96ade8da3a4d1fe81276ce576d3d1a928b14b377b5b55e3683b5e313ff256021994fd4cb08d4aa7d3c3b4747e4eea
-
SSDEEP
3072:aUDZ3U6U9IXYZM+4P2vOP5w+hrEI0TmCsb0:aUDZ3OCZMOprWQ0
Malware Config
Extracted
Family
icedid
C2
loadlisboa.casa
Signatures
-
Icedid family
-
IcedID First Stage Loader 2 IoCs
resource yara_rule behavioral2/memory/2132-1-0x0000000010000000-0x0000000010381000-memory.dmp IcedidFirstLoader behavioral2/memory/2132-2-0x0000000010000000-0x0000000010381000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 8 IoCs
flow pid Process 33 2132 rundll32.exe 36 2132 rundll32.exe 39 2132 rundll32.exe 42 2132 rundll32.exe 48 2132 rundll32.exe 51 2132 rundll32.exe 53 2132 rundll32.exe 62 2132 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1748 wrote to memory of 2132 1748 rundll32.exe 84 PID 1748 wrote to memory of 2132 1748 rundll32.exe 84 PID 1748 wrote to memory of 2132 1748 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f7caed3ce87cbdba9e6cbf93cf483424bfe7a43f47a820679ec4598cf3ed70c1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f7caed3ce87cbdba9e6cbf93cf483424bfe7a43f47a820679ec4598cf3ed70c1.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2132
-