Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
28-06-2022 22:32
Static task
static1
Behavioral task
behavioral1
Sample
r7kom.dll/documents.lnk
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
r7kom.dll/documents.lnk
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
Behavioral task
behavioral3
Sample
r7kom.dll/r7kom.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
r7kom.dll/r7kom.dll
-
Size
450KB
-
MD5
fdf40a208c17de2500e9a3a9aaccb5db
-
SHA1
9e86a5c1e94e561da0ca51d505fc899fb2c27635
-
SHA256
973bcb320032e9a12faee2971c15ec8c2c52dcf095699dc705a1d22118e58a18
-
SHA512
bd5c76d1526788dd8c8bae4a6273595d0817e4e3e1d725a04e250549194624465ec65967390830e17bec5b7ef88ccb96e61474852b8f25e01e704f3964b91197
Malware Config
Extracted
Family
icedid
Campaign
3568430872
C2
alionavon.com
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 2 1996 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 1996 rundll32.exe 1996 rundll32.exe