Analysis
-
max time kernel
106s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
05-07-2022 20:11
Static task
static1
Behavioral task
behavioral1
Sample
7287387845476394829823.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
7287387845476394829823.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
Case.pdf
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
Case.pdf
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
Case.pdf.lnk
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
Case.pdf.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral7
Sample
HDFcvLHBhKEQvBlli.ps1
Resource
win7-20220414-en
General
-
Target
Case.pdf.lnk
-
Size
2KB
-
MD5
81d3c327d043e682d692bad1326c29fa
-
SHA1
f6389335a6f1c6fecf60a5ce572f2611d01b5981
-
SHA256
4775f93534bca0f2efe8fbd2e6a67a98c8a6560e8ef6a9381802ef899ffbf4c4
-
SHA512
8c5bdd1e5d9c36814ae99f334e0f92ab406ed16b9db646901038fa2a8a81a24fcc9534902eb312b50af3fbc40e38d6e424e0673f48b006739508adfa6c7193bd
Malware Config
Extracted
icedid
1175749654
hlansmagazine.com
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 12 4816 rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
Processes:
powershell.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings powershell.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
powershell.exeAcroRd32.exerundll32.exeAdobeARM.exepid process 872 powershell.exe 872 powershell.exe 4380 AcroRd32.exe 4380 AcroRd32.exe 4380 AcroRd32.exe 4380 AcroRd32.exe 4380 AcroRd32.exe 4380 AcroRd32.exe 4380 AcroRd32.exe 4380 AcroRd32.exe 4380 AcroRd32.exe 4380 AcroRd32.exe 4380 AcroRd32.exe 4380 AcroRd32.exe 4380 AcroRd32.exe 4380 AcroRd32.exe 4380 AcroRd32.exe 4380 AcroRd32.exe 4816 rundll32.exe 4816 rundll32.exe 2300 AdobeARM.exe 2300 AdobeARM.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 872 powershell.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
AcroRd32.exeAdobeARM.exepid process 4380 AcroRd32.exe 4380 AcroRd32.exe 4380 AcroRd32.exe 4380 AcroRd32.exe 2300 AdobeARM.exe 4380 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.exepowershell.exeAcroRd32.exeRdrCEF.exedescription pid process target process PID 3112 wrote to memory of 872 3112 cmd.exe powershell.exe PID 3112 wrote to memory of 872 3112 cmd.exe powershell.exe PID 872 wrote to memory of 4380 872 powershell.exe AcroRd32.exe PID 872 wrote to memory of 4380 872 powershell.exe AcroRd32.exe PID 872 wrote to memory of 4380 872 powershell.exe AcroRd32.exe PID 872 wrote to memory of 4816 872 powershell.exe rundll32.exe PID 872 wrote to memory of 4816 872 powershell.exe rundll32.exe PID 4380 wrote to memory of 1672 4380 AcroRd32.exe RdrCEF.exe PID 4380 wrote to memory of 1672 4380 AcroRd32.exe RdrCEF.exe PID 4380 wrote to memory of 1672 4380 AcroRd32.exe RdrCEF.exe PID 4380 wrote to memory of 4352 4380 AcroRd32.exe RdrCEF.exe PID 4380 wrote to memory of 4352 4380 AcroRd32.exe RdrCEF.exe PID 4380 wrote to memory of 4352 4380 AcroRd32.exe RdrCEF.exe PID 1672 wrote to memory of 3176 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3176 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3176 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3176 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3176 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3176 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3176 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3176 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3176 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3176 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3176 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3176 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3176 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3176 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3176 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3176 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3176 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3176 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3176 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3176 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3176 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3176 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3176 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3176 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3176 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3176 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3176 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3176 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3176 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3176 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3176 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3176 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3176 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3176 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3176 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3176 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3176 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3176 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3176 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3176 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3176 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3504 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3504 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3504 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3504 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3504 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3504 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3504 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3504 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3504 1672 RdrCEF.exe RdrCEF.exe PID 1672 wrote to memory of 3504 1672 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Case.pdf.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass -w h -file HDFcvLHBhKEQvBlli.ps12⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Case.pdf"3⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140434⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=7E4C2E21CC2F5187EC686B7E4B10A9FF --mojo-platform-channel-handle=1720 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:3176
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=F88F6C58DF5439E08DB026727B90DC4A --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=F88F6C58DF5439E08DB026727B90DC4A --renderer-client-id=2 --mojo-platform-channel-handle=1736 --allow-no-sandbox-job /prefetch:15⤵PID:3504
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=34D4518BEA142D51E5485A41E1FC36B1 --mojo-platform-channel-handle=2284 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:3568
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=25A1DE639E86CFE84173EDC6566C0206 --mojo-platform-channel-handle=1944 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:4600
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=EE95882133EBCC54ACD1A9A5F0B94BF8 --mojo-platform-channel-handle=1892 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:2140
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140434⤵PID:4352
-
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" /PRODUCT:Reader /VERSION:19.0 /MODE:34⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2300 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe"5⤵PID:4824
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" 7287387845476394829823.dll,#13⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:4816