Analysis
-
max time kernel
1630s -
max time network
1641s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
14-06-2022 00:26
Static task
static1
Behavioral task
behavioral1
Sample
ahol3m.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ahol3m.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
documents.lnk
Resource
win7-20220414-en
General
-
Target
documents.lnk
-
Size
2KB
-
MD5
248322abe291aa979c34ee5f9bd76e70
-
SHA1
fdfa1670324e951e44736b75b4c12d7aac1a4338
-
SHA256
518a3f0b6e5709fcf44b04208167a51f77e4c82283f71b800a6faf297431f36c
-
SHA512
a37819e37d2b93c2043c21339a81ddd7dcc43f933cad369313efe45fee9e51f51e30556455d1e720071f60596d298c594b789e4a1b4fdc104cc903df2c684805
Malware Config
Extracted
icedid
1328647508
didojanza.com
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 2 812 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 812 rundll32.exe 812 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1260 wrote to memory of 812 1260 cmd.exe rundll32.exe PID 1260 wrote to memory of 812 1260 cmd.exe rundll32.exe PID 1260 wrote to memory of 812 1260 cmd.exe rundll32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\documents.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" ahol3m.dll,PluginInit2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:812