Analysis
-
max time kernel
40s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
18-05-2022 08:04
Static task
static1
Behavioral task
behavioral1
Sample
documents.lnk
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
documents.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
mi90o.dll
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
mi90o.dll
Resource
win10v2004-20220414-en
General
-
Target
documents.lnk
-
Size
1KB
-
MD5
fb7d17b5ec787f604a1c1a444ac13c03
-
SHA1
a72296fd3b7d5225a368ae3be57db9209315e1d7
-
SHA256
4ed0e46236e39c6efe3f1f96d6a1e3a5cc60b7bcfabe560823b141dcef4c66de
-
SHA512
1ffc5007e14aaacb9cafd31614a7f8fc9654f3c655cb5c167dd10c0a79e4703db902763ddaaabd8277e2c4849bbcabf30587123708e24343815874e61109ae1a
Malware Config
Extracted
icedid
3068011852
yolneanz.com
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 2 936 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 936 rundll32.exe 936 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1172 wrote to memory of 936 1172 cmd.exe rundll32.exe PID 1172 wrote to memory of 936 1172 cmd.exe rundll32.exe PID 1172 wrote to memory of 936 1172 cmd.exe rundll32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\documents.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" mi90o.dll,PluginInit2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:936