Analysis
-
max time kernel
91s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
27-06-2022 18:39
Static task
static1
Behavioral task
behavioral1
Sample
878.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
878.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
demand_letter.jpg.lnk
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
demand_letter.jpg.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
vGhhsvfLkp.ps1
Resource
win7-20220414-en
General
-
Target
demand_letter.jpg.lnk
-
Size
1KB
-
MD5
d01dc2fbb602e1058ae56f07fe895513
-
SHA1
decf03519d25e17b858d398d299b082ecf7e1fd1
-
SHA256
1040fce86562017f6eea2e609d1e7a49e928d140ac0e3bb30fd290f2b29d117b
-
SHA512
da7e540394e342db69fefa0c84d55d20e96f4e1764bb32fd4f87bd332b22d6a8b8923453aad2ab1f478200797fbdc68b8eddb618a8e2bc8e813e9f6c1bf08365
Malware Config
Extracted
icedid
3239568078
carbrownleger.com
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 11 2296 rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exerundll32.exepid process 688 powershell.exe 688 powershell.exe 2296 rundll32.exe 2296 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 688 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
cmd.exepowershell.exedescription pid process target process PID 4776 wrote to memory of 688 4776 cmd.exe powershell.exe PID 4776 wrote to memory of 688 4776 cmd.exe powershell.exe PID 688 wrote to memory of 2296 688 powershell.exe rundll32.exe PID 688 wrote to memory of 2296 688 powershell.exe rundll32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\demand_letter.jpg.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass -w h -file vGhhsvfLkp.ps12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" 878.dll,#13⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:2296