Analysis
-
max time kernel
140s -
max time network
180s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02-12-2022 11:06
Static task
static1
Behavioral task
behavioral1
Sample
IRS_Form_12-01-9/Scan.lnk
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
IRS_Form_12-01-9/Scan.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
IRS_Form_12-01-9/wiglid/foeZv.cmd
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
IRS_Form_12-01-9/wiglid/foeZv.cmd
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
IRS_Form_12-01-9/wiglid/laborsaving.dll
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
IRS_Form_12-01-9/wiglid/laborsaving.dll
Resource
win10v2004-20221111-en
General
-
Target
IRS_Form_12-01-9/Scan.lnk
-
Size
2KB
-
MD5
cd9141a0adf67b09758fea89e78ccac1
-
SHA1
86c34a4fb3f6e045ef5744cd1093d2de0e9ca04f
-
SHA256
1398d020e2dd025cc4821ea4432ae219fa556d1cb597287c3c85bc74802f3b61
-
SHA512
f0a5066410ef1d5dd256df8449f11a99d6d0823278da53e8add2c6a2b4d9e5f6e6509335117b13d06c31fef4c8f56681c328c616accd5e8386829ecc73f9bcdd
Malware Config
Extracted
icedid
2271535685
babysoftletirs.com
Signatures
-
Blocklisted process makes network request 3 IoCs
Processes:
rundll32.exeflow pid process 3 1116 rundll32.exe 4 1116 rundll32.exe 5 1116 rundll32.exe -
Loads dropped DLL 4 IoCs
Processes:
rundll32.exepid process 1116 rundll32.exe 1116 rundll32.exe 1116 rundll32.exe 1116 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 1116 rundll32.exe 1116 rundll32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
cmd.execmd.exedescription pid process target process PID 1276 wrote to memory of 1848 1276 cmd.exe cmd.exe PID 1276 wrote to memory of 1848 1276 cmd.exe cmd.exe PID 1276 wrote to memory of 1848 1276 cmd.exe cmd.exe PID 1848 wrote to memory of 920 1848 cmd.exe xcopy.exe PID 1848 wrote to memory of 920 1848 cmd.exe xcopy.exe PID 1848 wrote to memory of 920 1848 cmd.exe xcopy.exe PID 1848 wrote to memory of 1116 1848 cmd.exe rundll32.exe PID 1848 wrote to memory of 1116 1848 cmd.exe rundll32.exe PID 1848 wrote to memory of 1116 1848 cmd.exe rundll32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\IRS_Form_12-01-9\Scan.lnk1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wiglid\foeZv.cmd RQRU2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\xcopy.exexcopy /s /i /e /h wiglid\laborsaving.dll C:\Users\Admin\AppData\Local\Temp\*3⤵
-
C:\Windows\system32\rundll32.exerundll32 C:\Users\Admin\AppData\Local\Temp\laborsaving.dll,#13⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\laborsaving.dllFilesize
161KB
MD513dc944a91cffd0385e29ea899a43af2
SHA1793cfb6887fd324583ab1df77ff5e96391a3887b
SHA256af5f6f066ffc8c375d6e4d1138d63da32014d7ea21b8b7582da0cd8b97794cbe
SHA512258c0c920f0e76f2b883f967cf73114890f61abbee0824d9b2e913623feaeb53c2b1179bc34df49627fe39459e1d9b20986186015fa0168c7b452eeba7449c39
-
\Users\Admin\AppData\Local\Temp\laborsaving.dllFilesize
161KB
MD513dc944a91cffd0385e29ea899a43af2
SHA1793cfb6887fd324583ab1df77ff5e96391a3887b
SHA256af5f6f066ffc8c375d6e4d1138d63da32014d7ea21b8b7582da0cd8b97794cbe
SHA512258c0c920f0e76f2b883f967cf73114890f61abbee0824d9b2e913623feaeb53c2b1179bc34df49627fe39459e1d9b20986186015fa0168c7b452eeba7449c39
-
\Users\Admin\AppData\Local\Temp\laborsaving.dllFilesize
161KB
MD513dc944a91cffd0385e29ea899a43af2
SHA1793cfb6887fd324583ab1df77ff5e96391a3887b
SHA256af5f6f066ffc8c375d6e4d1138d63da32014d7ea21b8b7582da0cd8b97794cbe
SHA512258c0c920f0e76f2b883f967cf73114890f61abbee0824d9b2e913623feaeb53c2b1179bc34df49627fe39459e1d9b20986186015fa0168c7b452eeba7449c39
-
\Users\Admin\AppData\Local\Temp\laborsaving.dllFilesize
161KB
MD513dc944a91cffd0385e29ea899a43af2
SHA1793cfb6887fd324583ab1df77ff5e96391a3887b
SHA256af5f6f066ffc8c375d6e4d1138d63da32014d7ea21b8b7582da0cd8b97794cbe
SHA512258c0c920f0e76f2b883f967cf73114890f61abbee0824d9b2e913623feaeb53c2b1179bc34df49627fe39459e1d9b20986186015fa0168c7b452eeba7449c39
-
\Users\Admin\AppData\Local\Temp\laborsaving.dllFilesize
161KB
MD513dc944a91cffd0385e29ea899a43af2
SHA1793cfb6887fd324583ab1df77ff5e96391a3887b
SHA256af5f6f066ffc8c375d6e4d1138d63da32014d7ea21b8b7582da0cd8b97794cbe
SHA512258c0c920f0e76f2b883f967cf73114890f61abbee0824d9b2e913623feaeb53c2b1179bc34df49627fe39459e1d9b20986186015fa0168c7b452eeba7449c39
-
memory/920-89-0x0000000000000000-mapping.dmp
-
memory/1116-93-0x0000000000000000-mapping.dmp
-
memory/1116-99-0x0000000180000000-0x0000000180009000-memory.dmpFilesize
36KB
-
memory/1116-105-0x0000000000290000-0x00000000002A9000-memory.dmpFilesize
100KB
-
memory/1276-54-0x000007FEFB731000-0x000007FEFB733000-memory.dmpFilesize
8KB
-
memory/1848-88-0x0000000000000000-mapping.dmp