Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
29-06-2022 13:32
Static task
static1
Behavioral task
behavioral1
Sample
documents.lnk
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
documents.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
s4pesa.dll
Resource
win7-20220414-en
General
-
Target
documents.lnk
-
Size
2KB
-
MD5
77e1106d0ee3c074c5aa94663e62ca8c
-
SHA1
5149a36f2934cbe44a7066e96756d4ecb7a65cbd
-
SHA256
4633c5e89c5c9e60c3609dfb7f5ca1f0794c2b84c3468cdc2129d942d4e09cf3
-
SHA512
8644ef5ca3082bf4f062e53bdba5231f5b010c90fae919bb76f16dc46dae10a76e3ef94dca6d6ae709b4aaeb39b80eedbdc41298fc8d561e0561a51cde9575e6
Malware Config
Extracted
icedid
3652318967
yankyhoni.com
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 2 1048 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 1048 rundll32.exe 1048 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1412 wrote to memory of 1048 1412 cmd.exe rundll32.exe PID 1412 wrote to memory of 1048 1412 cmd.exe rundll32.exe PID 1412 wrote to memory of 1048 1412 cmd.exe rundll32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\documents.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" s4pesa.dll, #12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:1048