Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
06-07-2022 17:19
Static task
static1
Behavioral task
behavioral1
Sample
documents.lnk
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
documents.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
o5p0se.dll
Resource
win7-20220414-en
General
-
Target
documents.lnk
-
Size
2KB
-
MD5
221b153dbdad3521bda7049b4496238f
-
SHA1
5c912f7c3d1bbde2b5c6036e89944201907b8295
-
SHA256
b5f4d1173a053476903d2a8e193fd710bd011065e30855e259494a13f7f9b2da
-
SHA512
6296d4a54203680a79de1833b22d35c3e9d3808063777653d53c07d1d09201cc4ad56f150d3419c32faf926ada9567b3acf4e6572bee6901db54f19747fec377
Malware Config
Extracted
icedid
1060798742
carismorth.com
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 2 1492 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 1492 rundll32.exe 1492 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
cmd.execmd.exedescription pid process target process PID 1052 wrote to memory of 1760 1052 cmd.exe cmd.exe PID 1052 wrote to memory of 1760 1052 cmd.exe cmd.exe PID 1052 wrote to memory of 1760 1052 cmd.exe cmd.exe PID 1760 wrote to memory of 1492 1760 cmd.exe rundll32.exe PID 1760 wrote to memory of 1492 1760 cmd.exe rundll32.exe PID 1760 wrote to memory of 1492 1760 cmd.exe rundll32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\documents.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start rundll32.exe o5p0se.dll, #12⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\system32\rundll32.exerundll32.exe o5p0se.dll, #13⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:1492