Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 13:01
Static task
static1
Behavioral task
behavioral1
Sample
scandocument-ae95fa46-3120-423a-a996-4352e929a15d.lnk
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
scandocument-ae95fa46-3120-423a-a996-4352e929a15d.lnk
Resource
win10v2004-20220812-en
General
-
Target
scandocument-ae95fa46-3120-423a-a996-4352e929a15d.lnk
-
Size
1KB
-
MD5
b5113092d6fb6c1a102c89f639dd4e5f
-
SHA1
8b160db8a0097aab72188556eb524310761d8e17
-
SHA256
1a594552a35cdf773f62f0490668aaa749e1dc8ca1daa986133328934bac78e0
-
SHA512
7de10ffbc42dae217705ec09eb165c2e27449795d84d9af07e17740886bdf9b86cac8656669b5012627a8aefa34d41a3ce8444ffe341c58e321751ca4b53c403
Malware Config
Extracted
icedid
976968029
triskawilko.com
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 2 1380 rundll32.exe 4 1380 rundll32.exe 5 1380 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1380 rundll32.exe 1380 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1532 wrote to memory of 1192 1532 cmd.exe 28 PID 1532 wrote to memory of 1192 1532 cmd.exe 28 PID 1532 wrote to memory of 1192 1532 cmd.exe 28 PID 1192 wrote to memory of 1380 1192 cmd.exe 30 PID 1192 wrote to memory of 1380 1192 cmd.exe 30 PID 1192 wrote to memory of 1380 1192 cmd.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\scandocument-ae95fa46-3120-423a-a996-4352e929a15d.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start 162d3f31-6016-4ade-a866-04f42232c604.png && start ru^n^d^l^l3^2 8db1b77a-4fcd-4078-a901-f0cf9c198c52.2Pz,PluginInit2⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\system32\rundll32.exerundll32 8db1b77a-4fcd-4078-a901-f0cf9c198c52.2Pz,PluginInit3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:1380
-
-