Analysis
-
max time kernel
46s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
13-05-2022 12:56
Static task
static1
Behavioral task
behavioral1
Sample
cmd.bat
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
cmd.bat
-
Size
69B
-
MD5
5e9549ff24e0488d40f20979c9e9c6e4
-
SHA1
271430ffb14345fd1ed91d8339b60103979de8e6
-
SHA256
2465269b1d190d38aa49ed7d70429f7d5bb2688806f932d69ae43d3a58f7854b
-
SHA512
963ec4155f664a14f36690a2846ccdac42d62401e3397582cbe1022152e033a9e118e5af2d4618181b6fc974659e980c4894b6d5305ae925c604969905459840
Malware Config
Extracted
Family
icedid
Campaign
3000901376
C2
yolneanz.com
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 2 1668 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 1668 rundll32.exe 1668 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1660 wrote to memory of 1668 1660 cmd.exe rundll32.exe PID 1660 wrote to memory of 1668 1660 cmd.exe rundll32.exe PID 1660 wrote to memory of 1668 1660 cmd.exe rundll32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cmd.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\olasius.dll,PluginInit2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:1668