Analysis
-
max time kernel
152s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
22-02-2022 16:12
Static task
static1
Behavioral task
behavioral1
Sample
candyx32.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
candyx32.dll
Resource
win10v2004-en-20220112
Behavioral task
behavioral3
Sample
core.bat
Resource
win7-en-20211208
General
-
Target
core.bat
-
Size
184B
-
MD5
8e8c8dd91722dd16c50d410e921dfca2
-
SHA1
62524925b4f9c124d244aa9c42109877f36ff3fe
-
SHA256
4e46bcf388758863f9938fb095521c0bfb5c8f41942341f3a6aa0e0e48e7672d
-
SHA512
90de5ed56e2fdaa1d69315a19e1d6242b0ff5f6e41347893f98d02bf3f78a31cc954f8a193ca94e93942178928ddc5dc303bbce9bd4fde869032ea32831c6a4e
Malware Config
Extracted
icedid
Extracted
icedid
302245654
imilarquestio.top
heywanted.top
minimike.quest
alsohavethis.top
-
auth_var
5
-
url_path
/posts/
Signatures
-
Blocklisted process makes network request 3 IoCs
Processes:
rundll32.exeflow pid process 50 4080 rundll32.exe 53 4080 rundll32.exe 54 4080 rundll32.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 2320 rundll32.exe -
Modifies registry class 2 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\CLSID\{7422A187-B701-4438-F3B2-08CCD57253D9} rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\CLSID\{7422A187-B701-4438-F3B2-08CCD57253D9}\ = c1ed0844238cd5c45bca2740972e2238d12a47dce6d063550bd7c519dc2451aff5c2cce925695478ce955d9fcc1875a8fa19eb22962d9419f19a5fa53d4e01a3a99094b41845f5144966770ab41836e5e1199dff4fd50db0467b1077b432df6704a05c9a52326a97dba6509f332185169bdc99fe949da7a15423c22892f6b8673346595b599346a670bc146f2755595dcd9b3cd18fdaba94b2ca076f37d264ff7108ad137c284396c5664d4930ce911fe1e8772e1dda84ba56f16ab48cb3cb7b05dc rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 1928 wrote to memory of 4080 1928 cmd.exe rundll32.exe PID 1928 wrote to memory of 4080 1928 cmd.exe rundll32.exe PID 4080 wrote to memory of 2320 4080 rundll32.exe rundll32.exe PID 4080 wrote to memory of 2320 4080 rundll32.exe rundll32.exe PID 1928 wrote to memory of 3560 1928 cmd.exe rundll32.exe PID 1928 wrote to memory of 3560 1928 cmd.exe rundll32.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\core.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\candyx32.dat,DllMain /i="license.dat"2⤵
- Blocklisted process makes network request
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Admin\ized\Duzoaxce.dll",DllMain --ceok="license.dat"3⤵
- Loads dropped DLL
PID:2320
-
-
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\candyx32.dat,update /i="license.dat"2⤵PID:3560
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
de12075e6057a5e3c5533563124f9d1e
SHA183ae24664a05df7f8bf5051ce10d4993e5beb521
SHA2563eb204f20e1367e934980f8d10c6bcedea22a1837f1eeda221c0c390c1c6dc38
SHA5125cac45ffeb155d16ca8cc8b0d065a8ff309b937730a466eafc38237b3164fce072b4dbfd82e726b07f3d925d7ed6e81472e5168c8e730d2d8b01084aad4153c3
-
MD5
de12075e6057a5e3c5533563124f9d1e
SHA183ae24664a05df7f8bf5051ce10d4993e5beb521
SHA2563eb204f20e1367e934980f8d10c6bcedea22a1837f1eeda221c0c390c1c6dc38
SHA5125cac45ffeb155d16ca8cc8b0d065a8ff309b937730a466eafc38237b3164fce072b4dbfd82e726b07f3d925d7ed6e81472e5168c8e730d2d8b01084aad4153c3
-
MD5
7eb64145636d2e8343d9077f15c11022
SHA1c0b221ca05431092bc1c789a33d199124c8fec1c
SHA25696e657e1face63798a43e6210dba8d8c2f618d0be1230b95ab59d8bd23fc165a
SHA51253171e09d3d146fe02e481944e1c5481f1bb48eaf66259d1b8bbbbf7a83efc4a73fc28089c7e1eacf221620cdff6ea7f1049c17720181fde88b4bdc27c1ea9b6
-
MD5
c7c45636ca690acdab7fba1e9d126f8b
SHA161376304cd90786813a80680a92cef03fedb6484
SHA256cfc202b44509f2f607d365858a8218dfdc6b26f8087efcc5e46f4fef9ab53705
SHA5129e6c7df9f70017b9eeb5868a358bc9eaf50de65dad04640220f380ff72e80bc303f034cb62929abb0c35d951b751732a131ae828c4c01cd1826610423f784db8