Analysis
-
max time kernel
47s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
30-06-2022 08:46
Static task
static1
Behavioral task
behavioral1
Sample
p3roms/documents.lnk
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
p3roms/documents.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
p3roms/p3roms.dll
Resource
win7-20220414-en
General
-
Target
p3roms/documents.lnk
-
Size
2KB
-
MD5
6c2af96b292cb6a7c6446d533c8671e0
-
SHA1
d05130035893f1593be14105588df3f2262fd50c
-
SHA256
7d77120c1fcd7635d26e4f1041136bb382f832e170baf3640f238c9b51a1d220
-
SHA512
e0054f43f9c87c4c670600ec82b9576bd12b53feb21f5c55b7cd510611b91c38da0eaf4d84b5dd30adabffefd8ebf5e61526b9f2b706020576c8db385e33d364
Malware Config
Extracted
icedid
3652318967
yankyhoni.com
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 2 392 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 392 rundll32.exe 392 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1932 wrote to memory of 392 1932 cmd.exe rundll32.exe PID 1932 wrote to memory of 392 1932 cmd.exe rundll32.exe PID 1932 wrote to memory of 392 1932 cmd.exe rundll32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\p3roms\documents.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" p3roms.dll, #12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:392