Analysis
-
max time kernel
41s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
23-06-2022 08:57
Static task
static1
Behavioral task
behavioral1
Sample
s3lop1n/documents.lnk
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
s3lop1n/documents.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
s3lop1n/s3lop1n.dll
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
s3lop1n/s3lop1n.dll
Resource
win10v2004-20220414-en
General
-
Target
s3lop1n/documents.lnk
-
Size
2KB
-
MD5
067934b94afe525ffcea8f416efd0147
-
SHA1
273b442f0872a70e155b0434f0e4cb44a1d58f3a
-
SHA256
e72bd6fcd8251293848bc8be89844720f530835aabbae5e5d33d91c659e15b69
-
SHA512
17310703816a2284af89bcf214069e76840efa8322518861e94d5907f47410202b7c121f53b9a7967a8750d7b83244d566c62d0940b2c8713c4cd3923877cd80
Malware Config
Extracted
icedid
3433768635
bredofenction.com
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 2 1960 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 1960 rundll32.exe 1960 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 656 wrote to memory of 1960 656 cmd.exe rundll32.exe PID 656 wrote to memory of 1960 656 cmd.exe rundll32.exe PID 656 wrote to memory of 1960 656 cmd.exe rundll32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\s3lop1n\documents.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" s3lop1n.dll, PluginInit2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:1960