Analysis
-
max time kernel
46s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
02-07-2022 13:12
Static task
static1
Behavioral task
behavioral1
Sample
ker3p/documents.lnk
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
ker3p/documents.lnk
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
Behavioral task
behavioral3
Sample
ker3p/ker3p.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
ker3p/ker3p.dll
-
Size
424KB
-
MD5
c9955a4afdcca16c28107f274d816977
-
SHA1
d0e1807614e7112c2fd06388ab4ba93a9134f29f
-
SHA256
46786e3f05ec3271f4f71907aee0a8819d08b776f7e43e1ae4096ce22ec2f7d2
-
SHA512
24e28f00b50595d5d624572a627fa787b7e8c6c4eefb4dded3fabe6148abaa11a8079d2ca2c8e8233b5f554d5983722e6a29adaf91eb90f592f0cd560e4f49f8
Malware Config
Extracted
Family
icedid
Campaign
3635541348
C2
piponareatna.com
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 2 852 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 852 rundll32.exe 852 rundll32.exe