Analysis
-
max time kernel
39s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
28-06-2022 19:42
Static task
static1
Behavioral task
behavioral1
Sample
ta578_zippediso/documents.lnk
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ta578_zippediso/documents.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
ta578_zippediso/r7kom.dll
Resource
win7-20220414-en
General
-
Target
ta578_zippediso/documents.lnk
-
Size
2KB
-
MD5
ce783276c0618e3197fb2d3f51ae5790
-
SHA1
f42e8af4f540c3e6b6a77a8b272f976fc7d44b1d
-
SHA256
bb1fe6256cc9fc42bd74632871700af5f8663fe954a53378298b35c1f187f16b
-
SHA512
99485a9f6a7ab134a162c3a7de48284d76f946d877ac718899ec5c54fc3b00f3cc26070742993fbb823f200c6bfb7ebf98ab83be5881a7595f297a6773a5f05f
Malware Config
Extracted
icedid
3568430872
alionavon.com
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 2 1260 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 1260 rundll32.exe 1260 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1892 wrote to memory of 1260 1892 cmd.exe rundll32.exe PID 1892 wrote to memory of 1260 1892 cmd.exe rundll32.exe PID 1892 wrote to memory of 1260 1892 cmd.exe rundll32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ta578_zippediso\documents.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" r7kom.dll, #12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:1260