Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
29-06-2022 15:15
Static task
static1
Behavioral task
behavioral1
Sample
s4pesa/documents.lnk
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
s4pesa/documents.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
s4pesa/s4pesa.dll
Resource
win7-20220414-en
General
-
Target
s4pesa/documents.lnk
-
Size
2KB
-
MD5
77e1106d0ee3c074c5aa94663e62ca8c
-
SHA1
5149a36f2934cbe44a7066e96756d4ecb7a65cbd
-
SHA256
4633c5e89c5c9e60c3609dfb7f5ca1f0794c2b84c3468cdc2129d942d4e09cf3
-
SHA512
8644ef5ca3082bf4f062e53bdba5231f5b010c90fae919bb76f16dc46dae10a76e3ef94dca6d6ae709b4aaeb39b80eedbdc41298fc8d561e0561a51cde9575e6
Malware Config
Extracted
icedid
3652318967
yankyhoni.com
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 2 524 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 524 rundll32.exe 524 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1660 wrote to memory of 524 1660 cmd.exe rundll32.exe PID 1660 wrote to memory of 524 1660 cmd.exe rundll32.exe PID 1660 wrote to memory of 524 1660 cmd.exe rundll32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\s4pesa\documents.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" s4pesa.dll, #12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:524