Analysis
-
max time kernel
151s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
22-02-2022 16:13
Static task
static1
Behavioral task
behavioral1
Sample
core.bat
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
core.bat
Resource
win10v2004-en-20220113
Behavioral task
behavioral3
Sample
relief-x64.dll
Resource
win7-en-20211208
Behavioral task
behavioral4
Sample
relief-x64.dll
Resource
win10v2004-en-20220113
General
-
Target
core.bat
-
Size
188B
-
MD5
a1550b458ee5d98525dbdb544cb3a183
-
SHA1
a0672371da258190c2b4bc6aade702ee8db4a23c
-
SHA256
933793ba688465b30736a07fc9505a49c0a0053d88dc96ad8d5aa3e29a8768de
-
SHA512
91422eafa8072bd02d3ea371cfd0bd6570151f9eb9506649c3fd38175652be63921e0c6f125dd66771e66125b014a2cff3bdac63f40a33ab284dff81ed0ab061
Malware Config
Extracted
icedid
Extracted
icedid
3026272684
hashingold.top
asperuguz.store
loppidoaster.site
ndmarkrepo.top
-
auth_var
1
-
url_path
/posts/
Signatures
-
Blocklisted process makes network request 5 IoCs
Processes:
rundll32.exeflow pid process 54 4472 rundll32.exe 56 4472 rundll32.exe 60 4472 rundll32.exe 62 4472 rundll32.exe 77 4472 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe 4472 rundll32.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
cmd.exedescription pid process target process PID 2756 wrote to memory of 4472 2756 cmd.exe rundll32.exe PID 2756 wrote to memory of 4472 2756 cmd.exe rundll32.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\core.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\relief-x64.dat,DllMain /i="license.dat"2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:4472
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
c7c45636ca690acdab7fba1e9d126f8b
SHA161376304cd90786813a80680a92cef03fedb6484
SHA256cfc202b44509f2f607d365858a8218dfdc6b26f8087efcc5e46f4fef9ab53705
SHA5129e6c7df9f70017b9eeb5868a358bc9eaf50de65dad04640220f380ff72e80bc303f034cb62929abb0c35d951b751732a131ae828c4c01cd1826610423f784db8