Analysis
-
max time kernel
4294179s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
25-03-2022 15:16
Static task
static1
Behavioral task
behavioral1
Sample
Attachment.jpg
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
Attachment.jpg
Resource
win10v2004-20220310-en
Behavioral task
behavioral3
Sample
Attachment.png.lnk
Resource
win7-20220311-en
Behavioral task
behavioral4
Sample
Attachment.png.lnk
Resource
win10v2004-en-20220113
Behavioral task
behavioral5
Sample
FwlRpmIPXx.exe
Resource
win7-20220311-en
Behavioral task
behavioral6
Sample
FwlRpmIPXx.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral7
Sample
z.ps1
Resource
win7-20220311-en
Behavioral task
behavioral8
Sample
z.ps1
Resource
win10v2004-20220310-en
General
-
Target
FwlRpmIPXx.exe
-
Size
242KB
-
MD5
febd4b99b0131d10d95e71e9ec1d2476
-
SHA1
8d161b857215a037dcde09c9227d2784984f9fd8
-
SHA256
16641647772f6572cdf8554198279560e98ce8e686f4433ca64e2031b8ffabdc
-
SHA512
e112810667cbff52f5d82a17f7bf6274585511d020d050c9e457dc10308e651f8afad069765ae6f7d971ad771da20ee90162c5ed54490c2b255f7d324d049c13
Malware Config
Extracted
icedid
0
Extracted
icedid
3714063495
ritionalvalueon.top
Signatures
-
IcedID First Stage Loader 4 IoCs
Processes:
resource yara_rule behavioral5/memory/308-64-0x0000000140000000-0x000000014000B000-memory.dmp IcedidFirstLoader behavioral5/memory/308-65-0x0000000140000000-0x000000014000B000-memory.dmp IcedidFirstLoader behavioral5/memory/308-66-0x0000000140002B3C-mapping.dmp IcedidFirstLoader behavioral5/memory/308-68-0x0000000140000000-0x000000014000B000-memory.dmp IcedidFirstLoader -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
FwlRpmIPXx.exedescription pid process target process PID 1092 set thread context of 308 1092 FwlRpmIPXx.exe vbc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1796 308 WerFault.exe vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
FwlRpmIPXx.exedescription pid process Token: SeDebugPrivilege 1092 FwlRpmIPXx.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
FwlRpmIPXx.exevbc.exedescription pid process target process PID 1092 wrote to memory of 308 1092 FwlRpmIPXx.exe vbc.exe PID 1092 wrote to memory of 308 1092 FwlRpmIPXx.exe vbc.exe PID 1092 wrote to memory of 308 1092 FwlRpmIPXx.exe vbc.exe PID 1092 wrote to memory of 308 1092 FwlRpmIPXx.exe vbc.exe PID 1092 wrote to memory of 308 1092 FwlRpmIPXx.exe vbc.exe PID 1092 wrote to memory of 308 1092 FwlRpmIPXx.exe vbc.exe PID 1092 wrote to memory of 308 1092 FwlRpmIPXx.exe vbc.exe PID 1092 wrote to memory of 308 1092 FwlRpmIPXx.exe vbc.exe PID 1092 wrote to memory of 308 1092 FwlRpmIPXx.exe vbc.exe PID 1092 wrote to memory of 308 1092 FwlRpmIPXx.exe vbc.exe PID 1092 wrote to memory of 308 1092 FwlRpmIPXx.exe vbc.exe PID 308 wrote to memory of 1796 308 vbc.exe WerFault.exe PID 308 wrote to memory of 1796 308 vbc.exe WerFault.exe PID 308 wrote to memory of 1796 308 vbc.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\FwlRpmIPXx.exe"C:\Users\Admin\AppData\Local\Temp\FwlRpmIPXx.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 308 -s 283⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/308-61-0x0000000140000000-0x000000014000B000-memory.dmpFilesize
44KB
-
memory/308-63-0x0000000140000000-0x000000014000B000-memory.dmpFilesize
44KB
-
memory/308-68-0x0000000140000000-0x000000014000B000-memory.dmpFilesize
44KB
-
memory/308-57-0x0000000140000000-0x000000014000B000-memory.dmpFilesize
44KB
-
memory/308-58-0x0000000140000000-0x000000014000B000-memory.dmpFilesize
44KB
-
memory/308-60-0x0000000140000000-0x000000014000B000-memory.dmpFilesize
44KB
-
memory/308-66-0x0000000140002B3C-mapping.dmp
-
memory/308-62-0x0000000140000000-0x000000014000B000-memory.dmpFilesize
44KB
-
memory/308-65-0x0000000140000000-0x000000014000B000-memory.dmpFilesize
44KB
-
memory/308-64-0x0000000140000000-0x000000014000B000-memory.dmpFilesize
44KB
-
memory/1092-54-0x0000000000C50000-0x0000000000C90000-memory.dmpFilesize
256KB
-
memory/1092-55-0x000000001BEF0000-0x000000001BEF2000-memory.dmpFilesize
8KB
-
memory/1092-56-0x0000000000190000-0x000000000019C000-memory.dmpFilesize
48KB
-
memory/1796-69-0x0000000000000000-mapping.dmp