Analysis
-
max time kernel
124s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
12-12-2022 09:01
Static task
static1
Behavioral task
behavioral1
Sample
iced/Documents.lnk
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
iced/Documents.lnk
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
iced/askgothogtan/forbidding.dll
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
iced/askgothogtan/forbidding.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
iced/askgothogtan/ginbum.cmd
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
iced/askgothogtan/ginbum.cmd
Resource
win10v2004-20220812-en
General
-
Target
iced/Documents.lnk
-
Size
2KB
-
MD5
4237deaa85e5e4bbd6b925dc5b83984a
-
SHA1
740ae2cc9ed94d78607e3ddc7f83647434e5fade
-
SHA256
61c2586653dfec082d45671296840368df356d2c8770c8e2d6221fb6fe29ecac
-
SHA512
5117ce3f8ae987f32002c2313ff4d581a11d450eb597dc566204b98e17e33138da31da78d21a32f39ab0d3a213710bc35f48a9a132141468c930df0fcfee9622
Malware Config
Extracted
icedid
1268412609
ewgahskoot.com
Signatures
-
Blocklisted process makes network request 3 IoCs
Processes:
rundll32.exeflow pid process 2 2016 rundll32.exe 4 2016 rundll32.exe 5 2016 rundll32.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 2016 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 2016 rundll32.exe 2016 rundll32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
cmd.execmd.exedescription pid process target process PID 1492 wrote to memory of 1668 1492 cmd.exe cmd.exe PID 1492 wrote to memory of 1668 1492 cmd.exe cmd.exe PID 1492 wrote to memory of 1668 1492 cmd.exe cmd.exe PID 1668 wrote to memory of 520 1668 cmd.exe xcopy.exe PID 1668 wrote to memory of 520 1668 cmd.exe xcopy.exe PID 1668 wrote to memory of 520 1668 cmd.exe xcopy.exe PID 1668 wrote to memory of 2016 1668 cmd.exe rundll32.exe PID 1668 wrote to memory of 2016 1668 cmd.exe rundll32.exe PID 1668 wrote to memory of 2016 1668 cmd.exe rundll32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\iced\Documents.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c askgothogtan\ginbum.cmd2⤵
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\system32\xcopy.exexcopy /s /i /e /h askgothogtan\forbidding.tmp C:\Users\Admin\AppData\Local\Temp\*3⤵PID:520
-
-
C:\Windows\system32\rundll32.exerundll32 C:\Users\Admin\AppData\Local\Temp\forbidding.tmp,init3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2016
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
374KB
MD56242b580541d24a300b10998f33af74f
SHA1091b8d919aa4d340c4872ad97488eeb7866175e6
SHA25688b2a39578b88e560fd05ec2fcd971cf63e4fbeb229026ad5c0dc3bce17ea549
SHA512c1ee8be83d598277d7db31e9aad0318e710e73c5a89a61fc7554e79470ff8fab637954038a4817e5da188be20741bab2c6302c1c1df97df90c5c5b36d4913d13
-
Filesize
374KB
MD56242b580541d24a300b10998f33af74f
SHA1091b8d919aa4d340c4872ad97488eeb7866175e6
SHA25688b2a39578b88e560fd05ec2fcd971cf63e4fbeb229026ad5c0dc3bce17ea549
SHA512c1ee8be83d598277d7db31e9aad0318e710e73c5a89a61fc7554e79470ff8fab637954038a4817e5da188be20741bab2c6302c1c1df97df90c5c5b36d4913d13