Analysis
-
max time kernel
40s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
10-05-2022 14:59
Static task
static1
Behavioral task
behavioral1
Sample
documents.lnk
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
documents.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
olasius.dll
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
olasius.dll
Resource
win10v2004-20220414-en
General
-
Target
documents.lnk
-
Size
1KB
-
MD5
dc097dea18775a8f3d31b52697dc368e
-
SHA1
c9d5fe30ac230dc48d450182fb899c9638fb35bb
-
SHA256
f7861ee8b3917e3746d44a769453334c9bf1b780213634ed9abd42f7873b0593
-
SHA512
ad34d919b7e8dc014e53c14a3a6c74556a24b1258aec83eb3c5fe584c9c908ba3a11e001319ae22e51173c6908ba6c34e5dde7f4056d0cc753e645ea2310ddb0
Malware Config
Extracted
icedid
3000901376
yolneanz.com
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 2 1016 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 1016 rundll32.exe 1016 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1520 wrote to memory of 1016 1520 cmd.exe rundll32.exe PID 1520 wrote to memory of 1016 1520 cmd.exe rundll32.exe PID 1520 wrote to memory of 1016 1520 cmd.exe rundll32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\documents.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" olasius.dll,PluginInit2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:1016