Analysis
-
max time kernel
39s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
28-06-2022 16:52
Static task
static1
Behavioral task
behavioral1
Sample
loader.bat
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
loader.bat
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
Behavioral task
behavioral3
Sample
r7kom.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
r7kom.dll
-
Size
451KB
-
MD5
00c6652355b332b46339da2354482046
-
SHA1
a2521c32758afad2260f42944570ad06cdcaf9ff
-
SHA256
07050dd79a5274bbc864510beaf1a17b3fc71b08d4fcab12b0644497a514de91
-
SHA512
92299af72675d791d534195bd188b9880b6fce324b87f5399f8fcd90c316511a835943169fa0a0b9d0a9bac7b31fad0a184d90a94a6597b2c955bfddc69834c6
Malware Config
Extracted
Family
icedid
Campaign
3568430872
C2
alionavon.com
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 2 1892 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 1892 rundll32.exe 1892 rundll32.exe