Analysis
-
max time kernel
312s -
max time network
401s -
platform
windows10_x64 -
resource
win10-20220310-en -
submitted
11-03-2022 17:03
Static task
static1
Behavioral task
behavioral1
Sample
invoice_101.iso
Resource
win10-20220223-en
Behavioral task
behavioral2
Sample
document.lnk
Resource
win10-20220310-en
Behavioral task
behavioral3
Sample
main.dll
Resource
win10-20220223-en
General
-
Target
document.lnk
-
Size
2KB
-
MD5
a7ec43a3bd10d95a788f79c20ab8796f
-
SHA1
5c165fedae74c0ef60104772dc82f34520e1ff6f
-
SHA256
a17e32b43f96c8db69c979865a8732f3784c7c42714197091866473bcfac8250
-
SHA512
69eb3fd86ddf68e14f37dc7e862a9accf389b64c2a009c292da324bb63414453b51c6206845a1c364df0658288265a111900bbd09a50a920788dda67ccd6f2b2
Malware Config
Extracted
icedid
2401334462
emicthatmov.top
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 2740 regsvr32.exe 2740 regsvr32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
cmd.execmd.exedescription pid process target process PID 2100 wrote to memory of 2620 2100 cmd.exe cmd.exe PID 2100 wrote to memory of 2620 2100 cmd.exe cmd.exe PID 2620 wrote to memory of 2740 2620 cmd.exe regsvr32.exe PID 2620 wrote to memory of 2740 2620 cmd.exe regsvr32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\document.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start regsvr32.exe main.dll2⤵
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\system32\regsvr32.exeregsvr32.exe main.dll3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2740