Analysis
-
max time kernel
152s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
13-05-2022 12:56
Static task
static1
Behavioral task
behavioral1
Sample
cmd.bat
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
cmd.bat
-
Size
69B
-
MD5
5e9549ff24e0488d40f20979c9e9c6e4
-
SHA1
271430ffb14345fd1ed91d8339b60103979de8e6
-
SHA256
2465269b1d190d38aa49ed7d70429f7d5bb2688806f932d69ae43d3a58f7854b
-
SHA512
963ec4155f664a14f36690a2846ccdac42d62401e3397582cbe1022152e033a9e118e5af2d4618181b6fc974659e980c4894b6d5305ae925c604969905459840
Malware Config
Extracted
Family
icedid
Campaign
3000901376
C2
yolneanz.com
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 6 4808 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 4808 rundll32.exe 4808 rundll32.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
cmd.exedescription pid process target process PID 2460 wrote to memory of 4808 2460 cmd.exe rundll32.exe PID 2460 wrote to memory of 4808 2460 cmd.exe rundll32.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cmd.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\olasius.dll,PluginInit2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:4808