Analysis
-
max time kernel
44s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
28-06-2022 19:29
Static task
static1
Behavioral task
behavioral1
Sample
ta578/documents.lnk
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ta578/documents.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
ta578/r7kom.dll
Resource
win7-20220414-en
General
-
Target
ta578/documents.lnk
-
Size
2KB
-
MD5
bb31db59e05077fb9a7c3c87d1b98db9
-
SHA1
2ea630b90c9cbb41ae50145946c1e47c499c8df2
-
SHA256
3082534af9d5dcfbe3e2c5b02bce8fec53177ef89d9db6c116dafed1663a43f1
-
SHA512
3e2020dfcd3154c5f3b1d907f5fc3a31d55f9e780a7a4b3b82541cabcb94478c2caafe1672493d030616265109c33f7760363ca464638b90f302119612605d21
Malware Config
Extracted
icedid
3568430872
alionavon.com
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 2 1984 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 1984 rundll32.exe 1984 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1092 wrote to memory of 1984 1092 cmd.exe rundll32.exe PID 1092 wrote to memory of 1984 1092 cmd.exe rundll32.exe PID 1092 wrote to memory of 1984 1092 cmd.exe rundll32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ta578\documents.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" r7kom.dll, #12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:1984