Analysis
-
max time kernel
40s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-06-2022 14:39
Static task
static1
Behavioral task
behavioral1
Sample
mu7en/documents.lnk
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
mu7en/documents.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
mu7en/mu7en.dll
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
mu7en/mu7en.dll
Resource
win10v2004-20220414-en
General
-
Target
mu7en/documents.lnk
-
Size
2KB
-
MD5
cca15291edc87392d7c8c213ea97942e
-
SHA1
3b72a30211f24e4b119c812c23a6651600206551
-
SHA256
3cca8d1b4cfe0ebcf105621700454d0285ef1b44dfed3e3abf70060bb62aa5b4
-
SHA512
558eb218ab50e5b1b3bbf19798e60f4a9d9f98fe86219dd130a0620674c3a86ca10e39162e068162b55f372e16e788f37c4333c46ceee8ee66088658b78090aa
Malware Config
Extracted
icedid
3400213397
coolnexoz.com
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 2 1016 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 1016 rundll32.exe 1016 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1520 wrote to memory of 1016 1520 cmd.exe rundll32.exe PID 1520 wrote to memory of 1016 1520 cmd.exe rundll32.exe PID 1520 wrote to memory of 1016 1520 cmd.exe rundll32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\mu7en\documents.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" mu7en.dll,RunObject2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:1016