Analysis
-
max time kernel
92s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
13-03-2023 16:29
Static task
static1
Behavioral task
behavioral1
Sample
hockey32.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
hockey32.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
run.bat
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
run.bat
Resource
win10v2004-20230221-en
General
-
Target
run.bat
-
Size
53B
-
MD5
af3982e63bd6117a6da9735eaf3961c3
-
SHA1
81e9edb76f4dd178df7c0d79a0a1cbc875b0113f
-
SHA256
fb31610299ecc6455c4832c8d355b08d9cdeb57ebf3f780e376feaf6956739b8
-
SHA512
6d2216f375cd42ec2fa1559f487b410ba90b0514ab74c9678ef4f71d28c64444679ba45d27e11267f596ef390f881dfb1f5c6c159e53f63a16418736ee9f87fa
Malware Config
Extracted
icedid
998075300
blomskavino.com
alishaskainz.com
-
auth_var
22
-
url_path
/news/
Signatures
-
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
cmd.exedescription pid process target process PID 1996 wrote to memory of 4448 1996 cmd.exe rundll32.exe PID 1996 wrote to memory of 4448 1996 cmd.exe rundll32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4448-133-0x0000000180000000-0x0000000180005000-memory.dmpFilesize
20KB
-
memory/4448-137-0x0000000180000000-0x0000000180005000-memory.dmpFilesize
20KB
-
memory/4448-138-0x0000000180000000-0x0000000180005000-memory.dmpFilesize
20KB
-
memory/4448-139-0x0000016365C00000-0x0000016365C01000-memory.dmpFilesize
4KB