Analysis
-
max time kernel
1643s -
max time network
1429s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
12-03-2022 14:38
Static task
static1
Behavioral task
behavioral1
Sample
document.lnk
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
document.lnk
Resource
win10v2004-en-20220113
Behavioral task
behavioral3
Sample
main.dll
Resource
win7-20220310-en
Behavioral task
behavioral4
Sample
main.dll
Resource
win10v2004-en-20220113
General
-
Target
document.lnk
-
Size
2KB
-
MD5
a7ec43a3bd10d95a788f79c20ab8796f
-
SHA1
5c165fedae74c0ef60104772dc82f34520e1ff6f
-
SHA256
a17e32b43f96c8db69c979865a8732f3784c7c42714197091866473bcfac8250
-
SHA512
69eb3fd86ddf68e14f37dc7e862a9accf389b64c2a009c292da324bb63414453b51c6206845a1c364df0658288265a111900bbd09a50a920788dda67ccd6f2b2
Malware Config
Extracted
icedid
2401334462
emicthatmov.top
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 1340 regsvr32.exe 1340 regsvr32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
cmd.execmd.exedescription pid process target process PID 848 wrote to memory of 1224 848 cmd.exe cmd.exe PID 848 wrote to memory of 1224 848 cmd.exe cmd.exe PID 1224 wrote to memory of 1340 1224 cmd.exe regsvr32.exe PID 1224 wrote to memory of 1340 1224 cmd.exe regsvr32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\document.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start regsvr32.exe main.dll2⤵
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\system32\regsvr32.exeregsvr32.exe main.dll3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1340