General
-
Target
enjoin,12.27.2021.doc
-
Size
77KB
-
Sample
211231-m85kasfchr
-
MD5
7044bd240219ec2f83b01c532e2ce5ba
-
SHA1
745cdbc4a826c5960eef3f4a9aa307ff94e4b7fb
-
SHA256
ecd84fa8d836d5057149b2b3a048d75004ca1a1377fcf2f5e67374af3a1161a0
-
SHA512
8467fc9f63711c8fa460f1f35d42b6528c6e285799d9a19630696dd3a12e24799370eaa6d53e075e60d579a3b4ecef035cf62aac6a1bc96130b392c3931882ee
Static task
static1
Behavioral task
behavioral1
Sample
enjoin,12.27.2021.doc
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
enjoin,12.27.2021.doc
Resource
win10-en-20211208
Malware Config
Extracted
icedid
2507181075
vopnoz.com
Targets
-
-
Target
enjoin,12.27.2021.doc
-
Size
77KB
-
MD5
7044bd240219ec2f83b01c532e2ce5ba
-
SHA1
745cdbc4a826c5960eef3f4a9aa307ff94e4b7fb
-
SHA256
ecd84fa8d836d5057149b2b3a048d75004ca1a1377fcf2f5e67374af3a1161a0
-
SHA512
8467fc9f63711c8fa460f1f35d42b6528c6e285799d9a19630696dd3a12e24799370eaa6d53e075e60d579a3b4ecef035cf62aac6a1bc96130b392c3931882ee
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Loads dropped DLL
-