Analysis
-
max time kernel
39s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
28-06-2022 22:32
Static task
static1
Behavioral task
behavioral1
Sample
r7kom.dll/documents.lnk
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
r7kom.dll/documents.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
r7kom.dll/r7kom.dll
Resource
win7-20220414-en
General
-
Target
r7kom.dll/documents.lnk
-
Size
2KB
-
MD5
ce783276c0618e3197fb2d3f51ae5790
-
SHA1
f42e8af4f540c3e6b6a77a8b272f976fc7d44b1d
-
SHA256
bb1fe6256cc9fc42bd74632871700af5f8663fe954a53378298b35c1f187f16b
-
SHA512
99485a9f6a7ab134a162c3a7de48284d76f946d877ac718899ec5c54fc3b00f3cc26070742993fbb823f200c6bfb7ebf98ab83be5881a7595f297a6773a5f05f
Malware Config
Extracted
icedid
3568430872
alionavon.com
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 2 300 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 300 rundll32.exe 300 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1884 wrote to memory of 300 1884 cmd.exe rundll32.exe PID 1884 wrote to memory of 300 1884 cmd.exe rundll32.exe PID 1884 wrote to memory of 300 1884 cmd.exe rundll32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\r7kom.dll\documents.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" r7kom.dll, #12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:300