Analysis
-
max time kernel
125s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 16:13
Static task
static1
Behavioral task
behavioral1
Sample
93d1e2cb11d3c40ce8f90faf5168e72b2a246688255b12a22c17dba101cf79b3_JC.vbs
Resource
win7-20230831-en
General
-
Target
93d1e2cb11d3c40ce8f90faf5168e72b2a246688255b12a22c17dba101cf79b3_JC.vbs
-
Size
1012KB
-
MD5
4c985d2908c33310a62a43655daecd1a
-
SHA1
9cb3bc3f35e7b3ae8ffd9d65522391b1ee1ca816
-
SHA256
93d1e2cb11d3c40ce8f90faf5168e72b2a246688255b12a22c17dba101cf79b3
-
SHA512
d0970cae134b4450ae93cd15bf3a91c277503c9fa7700cd551498a0ccb3e9917508b3c30c218ff3363e19cce58e43594f2261f5aeb686041bb27fe7653cad35f
-
SSDEEP
6144:WcbBAYe11DSXXc6iD5mhg19cDproukuwHlqwYxTpu36+sFkA390SY1J5kdazfPgo:DK4gV1SAkTxTpsu3uJ2oyAUB/0
Malware Config
Extracted
icedid
361893872
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 11 2540 rundll32.exe 13 2540 rundll32.exe -
Loads dropped DLL 5 IoCs
pid Process 2652 regsvr32.exe 2540 rundll32.exe 2540 rundll32.exe 2540 rundll32.exe 2540 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000_CLASSES\CLSID\{F699FD4F-582E-0504-D361-4CA8EBBF4E36} rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000_CLASSES\CLSID\{F699FD4F-582E-0504-D361-4CA8EBBF4E36}\ = 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 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2652 regsvr32.exe 2652 regsvr32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2456 wrote to memory of 2652 2456 WScript.exe 28 PID 2456 wrote to memory of 2652 2456 WScript.exe 28 PID 2456 wrote to memory of 2652 2456 WScript.exe 28 PID 2456 wrote to memory of 2652 2456 WScript.exe 28 PID 2456 wrote to memory of 2652 2456 WScript.exe 28 PID 2652 wrote to memory of 2040 2652 regsvr32.exe 29 PID 2652 wrote to memory of 2040 2652 regsvr32.exe 29 PID 2652 wrote to memory of 2040 2652 regsvr32.exe 29 PID 2040 wrote to memory of 2540 2040 cmd.exe 32 PID 2040 wrote to memory of 2540 2040 cmd.exe 32 PID 2040 wrote to memory of 2540 2040 cmd.exe 32 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\93d1e2cb11d3c40ce8f90faf5168e72b2a246688255b12a22c17dba101cf79b3_JC.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" C://windows/Temp/0291-1.dll2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C rundll32.exe C:\Users\Admin\AppData\Roaming\Admin\Admin\ojasduacot.dll,#13⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Roaming\Admin\Admin\ojasduacot.dll,#14⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Modifies registry class
PID:2540
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a19c933236ede6b8071460e8e847b8ae
SHA1578bbd1b5bd479d7ecf86459185cf99d6c1b1cad
SHA2568d8a979c742c638fdbcf46cfe5c1a367dfdd3a4310acf4340b41d290d2b36894
SHA512f84246e1d7e6af9902b0981be895ab339e28900c1d86b7e836dc8bff0f07a406ecae58ba14891cec59835bbe3243a44742c35ee618e35eb6622a022495edf26b
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
Filesize
556KB
MD5002c64d47bf8c0878ac8ec2b4740f682
SHA1acc44c89420270083de7d67b025748a4b98071ed
SHA256b4f17e438636e166a94b2cd7c83e1c2b3cf1184122b6204521c1024e293ba8b1
SHA51280f44373c7dc7a08d94b65e1f830e6d922ae9b8fefca5beadaf6a1a8c33622219da404bed11daeb7de03f1b3432782a11cd019ff814b981b9e6885066666affd
-
Filesize
328KB
MD518e3ba07f71f96cd6f174846f607bc4e
SHA16e263fec38683f76f5b8c5c53eea1b333d7dbd8f
SHA256226faebe0332ae4972d6bbc0e99553b4875322fb4336dfe3e42462d4c3624e79
SHA51233010f0eaef846be5143e30cd307c61c36e3c34c04ee4380539caa63dec62854a3a7881ef1881ecc38ff6680bdcafde98e175e218bb1e8b4cd197742f396929a
-
Filesize
556KB
MD5002c64d47bf8c0878ac8ec2b4740f682
SHA1acc44c89420270083de7d67b025748a4b98071ed
SHA256b4f17e438636e166a94b2cd7c83e1c2b3cf1184122b6204521c1024e293ba8b1
SHA51280f44373c7dc7a08d94b65e1f830e6d922ae9b8fefca5beadaf6a1a8c33622219da404bed11daeb7de03f1b3432782a11cd019ff814b981b9e6885066666affd
-
Filesize
556KB
MD5002c64d47bf8c0878ac8ec2b4740f682
SHA1acc44c89420270083de7d67b025748a4b98071ed
SHA256b4f17e438636e166a94b2cd7c83e1c2b3cf1184122b6204521c1024e293ba8b1
SHA51280f44373c7dc7a08d94b65e1f830e6d922ae9b8fefca5beadaf6a1a8c33622219da404bed11daeb7de03f1b3432782a11cd019ff814b981b9e6885066666affd
-
Filesize
556KB
MD5002c64d47bf8c0878ac8ec2b4740f682
SHA1acc44c89420270083de7d67b025748a4b98071ed
SHA256b4f17e438636e166a94b2cd7c83e1c2b3cf1184122b6204521c1024e293ba8b1
SHA51280f44373c7dc7a08d94b65e1f830e6d922ae9b8fefca5beadaf6a1a8c33622219da404bed11daeb7de03f1b3432782a11cd019ff814b981b9e6885066666affd
-
Filesize
556KB
MD5002c64d47bf8c0878ac8ec2b4740f682
SHA1acc44c89420270083de7d67b025748a4b98071ed
SHA256b4f17e438636e166a94b2cd7c83e1c2b3cf1184122b6204521c1024e293ba8b1
SHA51280f44373c7dc7a08d94b65e1f830e6d922ae9b8fefca5beadaf6a1a8c33622219da404bed11daeb7de03f1b3432782a11cd019ff814b981b9e6885066666affd
-
Filesize
328KB
MD518e3ba07f71f96cd6f174846f607bc4e
SHA16e263fec38683f76f5b8c5c53eea1b333d7dbd8f
SHA256226faebe0332ae4972d6bbc0e99553b4875322fb4336dfe3e42462d4c3624e79
SHA51233010f0eaef846be5143e30cd307c61c36e3c34c04ee4380539caa63dec62854a3a7881ef1881ecc38ff6680bdcafde98e175e218bb1e8b4cd197742f396929a