Analysis
-
max time kernel
300s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 06:17
Static task
static1
Behavioral task
behavioral1
Sample
core.bat
Resource
win7-20220414-en
General
-
Target
core.bat
-
Size
123B
-
MD5
7ed83700f1db2f30269d8d7aab15fc38
-
SHA1
787f6c843d5b41562baceeb67d1dea686f0891eb
-
SHA256
2db50c09350bd707c6cd1c413f15f5360b8a9cd9145caafa07bffe29d1c6ea51
-
SHA512
974202b6def2cc1463452384c94f2d3d562115b7e571170f128197bd6600fffdd73feb4381bd3a647d9f473d88b15838d10e733539b009bd2d29fd2ec257d3f4
Malware Config
Extracted
icedid
2406015698
commamimubebe.site
asredetyr.site
aszepolityu.fun
likoportio.fun
-
auth_var
6
-
url_path
/news/
Extracted
icedid
Signatures
-
Blocklisted process makes network request 5 IoCs
Processes:
rundll32.exeflow pid process 3 1900 rundll32.exe 5 1900 rundll32.exe 7 1900 rundll32.exe 9 1900 rundll32.exe 11 1900 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe 1900 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 2036 wrote to memory of 1900 2036 cmd.exe rundll32.exe PID 2036 wrote to memory of 1900 2036 cmd.exe rundll32.exe PID 2036 wrote to memory of 1900 2036 cmd.exe rundll32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\core.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\clutch-32.tmp,Bjaskkas /i="license.dat"2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:1900
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
334KB
MD5c3db0f946699412e8f3a2775516116a2
SHA1a01448e2760dcb2fbed70a634baaae559d3b6de0
SHA256dbe9743c9c57247cb9275a23a84909dd78aca59f584df62197bde07cb87bd1ed
SHA51250b2e9b3446463f4b02980587b3f4bd716f5b018e26085f10d38c42fd0f6e07891438d13ccc5b36f38ab9c7f1ea874814ed266f8551a970c8ca3eb73ac6b4950