Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
06-07-2022 16:50
Static task
static1
Behavioral task
behavioral1
Sample
h1mor3/documents.lnk
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
h1mor3/documents.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
h1mor3/h1mor3.dll
Resource
win7-20220414-en
General
-
Target
h1mor3/documents.lnk
-
Size
2KB
-
MD5
21d1b6bbdf3b78678beb355220365222
-
SHA1
7444806f4739b1b33f4f1d008f0493863b77f8ea
-
SHA256
505a6950fda3c810bb1847bd0e11a49cf1b20e57cdf8c7817e58d27e075453a2
-
SHA512
13e976c2d2b1096b675f983baf18a960b2300a1ec52bdd609ba6483eb126092c80249a01971ccfea22347e2fbddc746b0ae26d77471ab40899c722aa3c918ac2
Malware Config
Extracted
icedid
4105767744
frodupshopping.com
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 8 5096 rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 5096 rundll32.exe 5096 rundll32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
cmd.execmd.exedescription pid process target process PID 2344 wrote to memory of 5088 2344 cmd.exe cmd.exe PID 2344 wrote to memory of 5088 2344 cmd.exe cmd.exe PID 5088 wrote to memory of 5096 5088 cmd.exe rundll32.exe PID 5088 wrote to memory of 5096 5088 cmd.exe rundll32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\h1mor3\documents.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start rundll32.exe h1mor3.dll, #12⤵
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\system32\rundll32.exerundll32.exe h1mor3.dll, #13⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:5096