Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
04-11-2021 00:51
Static task
static1
Behavioral task
behavioral1
Sample
core.bat
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
core.bat
Resource
win10-en-20211014
Behavioral task
behavioral3
Sample
pigeon64.dat.dll
Resource
win7-en-20210920
Behavioral task
behavioral4
Sample
pigeon64.dat.dll
Resource
win10-en-20210920
General
-
Target
core.bat
-
Size
184B
-
MD5
2b4f27b826aec08eb90ff784b25d048d
-
SHA1
b1444548b53ec112797cc7d03a1e227fe71315ca
-
SHA256
b976471778c3abead8001c5a7db7d39b461e88bbd5322a579d86c1ca725375fb
-
SHA512
d6316825b5372e445941b75b08b04aaee49bab12d752dba4691aac8093100d1632a1b07e6b7d6899c528e6777f0bcfcd977e02a7f8d559b29e205703f573d434
Malware Config
Extracted
icedid
Extracted
icedid
1217670233
nnelforwfin.top
lakogrefop.rest
hangetilin.top
follytresh.co
-
auth_var
12
-
url_path
/posts/
Signatures
-
Blocklisted process makes network request 3 IoCs
Processes:
rundll32.exeflow pid process 23 4288 rundll32.exe 26 4288 rundll32.exe 27 4288 rundll32.exe -
Modifies registry class 2 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\CLSID\{5DF9B473-799E-2B3A-B1AA-5F5F7BEF56E5} rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\CLSID\{5DF9B473-799E-2B3A-B1AA-5F5F7BEF56E5}\ = 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 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe 4288 rundll32.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
cmd.exedescription pid process target process PID 3828 wrote to memory of 4288 3828 cmd.exe rundll32.exe PID 3828 wrote to memory of 4288 3828 cmd.exe rundll32.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\core.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\pigeon64.dat,DllMain /i="license.dat"2⤵
- Blocklisted process makes network request
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4288
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
b03af34cc11c8bd53afd958c839dd59f
SHA1d9c90d8f770be66850ea0734580867c16d64b404
SHA25671c9c15896b027fd830423f6226587bdad3f09681799bf3e69abb0479f18a853
SHA512c33204f04a99272a1619a4fe6e3ba5e128c437968f8f570c12ffbf20a71e2b617535a70bf51f9d4ddcccc7f44804a13a4528ece4470e4ee53273ad1806313911