Analysis

  • max time kernel
    1630s
  • max time network
    1641s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    14-06-2022 00:26

General

  • Target

    documents.lnk

  • Size

    2KB

  • MD5

    248322abe291aa979c34ee5f9bd76e70

  • SHA1

    fdfa1670324e951e44736b75b4c12d7aac1a4338

  • SHA256

    518a3f0b6e5709fcf44b04208167a51f77e4c82283f71b800a6faf297431f36c

  • SHA512

    a37819e37d2b93c2043c21339a81ddd7dcc43f933cad369313efe45fee9e51f51e30556455d1e720071f60596d298c594b789e4a1b4fdc104cc903df2c684805

Malware Config

Extracted

Family

icedid

Campaign

1328647508

C2

didojanza.com

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • suricata: ET MALWARE Win32/IcedID Request Cookie

    suricata: ET MALWARE Win32/IcedID Request Cookie

  • Blocklisted process makes network request 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\documents.lnk
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1260
    • C:\Windows\System32\rundll32.exe
      "C:\Windows\System32\rundll32.exe" ahol3m.dll,PluginInit
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      PID:812

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/812-88-0x0000000000000000-mapping.dmp

  • memory/812-92-0x0000000180000000-0x0000000180009000-memory.dmp

    Filesize

    36KB

  • memory/1260-54-0x000007FEFB9A1000-0x000007FEFB9A3000-memory.dmp

    Filesize

    8KB