Analysis
-
max time kernel
43s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
06-07-2022 16:50
Static task
static1
Behavioral task
behavioral1
Sample
h1mor3/documents.lnk
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
h1mor3/documents.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
h1mor3/h1mor3.dll
Resource
win7-20220414-en
General
-
Target
h1mor3/documents.lnk
-
Size
2KB
-
MD5
21d1b6bbdf3b78678beb355220365222
-
SHA1
7444806f4739b1b33f4f1d008f0493863b77f8ea
-
SHA256
505a6950fda3c810bb1847bd0e11a49cf1b20e57cdf8c7817e58d27e075453a2
-
SHA512
13e976c2d2b1096b675f983baf18a960b2300a1ec52bdd609ba6483eb126092c80249a01971ccfea22347e2fbddc746b0ae26d77471ab40899c722aa3c918ac2
Malware Config
Extracted
icedid
4105767744
frodupshopping.com
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 2 1064 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 1064 rundll32.exe 1064 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
cmd.execmd.exedescription pid process target process PID 1864 wrote to memory of 1836 1864 cmd.exe cmd.exe PID 1864 wrote to memory of 1836 1864 cmd.exe cmd.exe PID 1864 wrote to memory of 1836 1864 cmd.exe cmd.exe PID 1836 wrote to memory of 1064 1836 cmd.exe rundll32.exe PID 1836 wrote to memory of 1064 1836 cmd.exe rundll32.exe PID 1836 wrote to memory of 1064 1836 cmd.exe rundll32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\h1mor3\documents.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start rundll32.exe h1mor3.dll, #12⤵
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\system32\rundll32.exerundll32.exe h1mor3.dll, #13⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:1064