Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
02-07-2022 13:12
Static task
static1
Behavioral task
behavioral1
Sample
ker3p/documents.lnk
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ker3p/documents.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
ker3p/ker3p.dll
Resource
win7-20220414-en
General
-
Target
ker3p/documents.lnk
-
Size
2KB
-
MD5
bb347ab4742d9c9b5cafe0aac6ab1316
-
SHA1
6296df650baf990a47e8c97f7ca0e20fadff8962
-
SHA256
1d34cb09006522f9c3f48858814fdf22a7bb698cd72b9302f8319f0cb3768a19
-
SHA512
47cd1e449d80c9f7fe0f6b4c4d1da4db7a1453f3d738330cccee86884218496f78ff934d3c2d43978f75779d5ef3c635f2daee3894136f5abf5fec6797c1f6cc
Malware Config
Extracted
icedid
3635541348
piponareatna.com
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 2 1728 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 1728 rundll32.exe 1728 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1532 wrote to memory of 1728 1532 cmd.exe rundll32.exe PID 1532 wrote to memory of 1728 1532 cmd.exe rundll32.exe PID 1532 wrote to memory of 1728 1532 cmd.exe rundll32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ker3p\documents.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" ker3p.dll, #12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:1728