Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
17-05-2022 02:37
Static task
static1
Behavioral task
behavioral1
Sample
documents.lnk
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
documents.lnk
-
Size
1KB
-
MD5
5dd2663a72c1114ef4257c69f07f7973
-
SHA1
1891936886f9114c2af23fa13845fdc28cb98326
-
SHA256
30705ee86a30f4373203d1be11715ba4bf5709bc277b369ea7d4f6b19d024279
-
SHA512
a10c78a86c185e37bcd0afbdf68ef65b19c39d35d308b8535c23f0a205f2d32c0f41850080b759de628267357dd5fe0fca736d4de0111cda45bc92c0c040173f
Malware Config
Extracted
Family
icedid
Campaign
3084789471
C2
yolneanz.com
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 2 1008 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 1008 rundll32.exe 1008 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1380 wrote to memory of 1008 1380 cmd.exe rundll32.exe PID 1380 wrote to memory of 1008 1380 cmd.exe rundll32.exe PID 1380 wrote to memory of 1008 1380 cmd.exe rundll32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\documents.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" starkam.dll,PluginInit2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:1008