Resubmissions
17-03-2022 16:28
220317-tyt45schbr 102-03-2022 07:56
220302-js74psdhh5 1024-02-2022 19:52
220224-ylj6maehbj 1Analysis
-
max time kernel
602s -
max time network
439s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
02-03-2022 07:56
Static task
static1
Behavioral task
behavioral1
Sample
core.bat
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
core.bat
Resource
win10v2004-en-20220113
Behavioral task
behavioral3
Sample
pumpkin-32.dll
Resource
win7-en-20211208
Behavioral task
behavioral4
Sample
pumpkin-32.dll
Resource
win10v2004-en-20220113
General
-
Target
core.bat
-
Size
188B
-
MD5
5d557256208a36dcd239278ba626f30c
-
SHA1
1e54238d55ab57ab5e7b787d3f369d6a02374d2b
-
SHA256
26cfdedc156563695d6188240fa38ee5d3b29e468dee368facf66b8710eae3e2
-
SHA512
2cd8215e99f4d61035747670dd2109aa806fe4c505648982926bb1bd886eadf1da583823e019e8af34939531bf669b6ffb19a334f3c3e678c56a7f5ebe2745ad
Malware Config
Extracted
icedid
Extracted
icedid
3560182600
coolbearblunts.com
cooldogblunts.com
-
auth_var
2
-
url_path
/news/
Signatures
-
Blocklisted process makes network request 3 IoCs
Processes:
rundll32.exeflow pid process 54 2452 rundll32.exe 56 2452 rundll32.exe 58 2452 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe 2452 rundll32.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
cmd.exedescription pid process target process PID 1852 wrote to memory of 2452 1852 cmd.exe rundll32.exe PID 1852 wrote to memory of 2452 1852 cmd.exe rundll32.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\core.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\pumpkin-32.tmp,DllMain /i="license.dat"2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:2452
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
7eb64145636d2e8343d9077f15c11022
SHA1c0b221ca05431092bc1c789a33d199124c8fec1c
SHA25696e657e1face63798a43e6210dba8d8c2f618d0be1230b95ab59d8bd23fc165a
SHA51253171e09d3d146fe02e481944e1c5481f1bb48eaf66259d1b8bbbbf7a83efc4a73fc28089c7e1eacf221620cdff6ea7f1049c17720181fde88b4bdc27c1ea9b6