Analysis
-
max time kernel
86s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
24-02-2022 21:10
Static task
static1
Behavioral task
behavioral1
Sample
Attachment.jpg.lnk
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Attachment.jpg.lnk
Resource
win10v2004-en-20220113
windows10-2004_x64
0 signatures
0 seconds
Behavioral task
behavioral3
Sample
z.ps1
Resource
win7-20220223-en
windows7_x64
0 signatures
0 seconds
General
-
Target
z.ps1
-
Size
264KB
-
MD5
b9942f242fc7a5b191d369d62419427f
-
SHA1
465d2a92253adda3da9c6141e972bdbb3581fd60
-
SHA256
4bec4c4012eab37036844348e9d5df6e98e3f9dbd2be3a7b4dfd8ba78e8b5a2e
-
SHA512
40484368690f992f64ea7b874202b71af278c11f131c5b128b3f8b1b34f93c801d99666466046dd0abf92bfce206d616a6014decf344c499962bb79515cad6f2
Malware Config
Extracted
Family
icedid
Campaign
3976801418
C2
blinkenx.com
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
IcedID First Stage Loader 1 IoCs
Processes:
resource yara_rule behavioral4/memory/4064-164-0x00000232C3300000-0x00000232C330B000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 3 IoCs
Processes:
powershell.exeflow pid process 31 4064 powershell.exe 40 4064 powershell.exe 42 4064 powershell.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exepid process 4064 powershell.exe 4064 powershell.exe 4064 powershell.exe 4064 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 4064 powershell.exe