Analysis
-
max time kernel
157s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 19:17
Static task
static1
Behavioral task
behavioral1
Sample
c1ef40e8ab20ce2ae541a4b2a21de4ccedd94a212d049b39ea392959cecb0106_JC.vbs
Resource
win7-20230831-en
General
-
Target
c1ef40e8ab20ce2ae541a4b2a21de4ccedd94a212d049b39ea392959cecb0106_JC.vbs
-
Size
1012KB
-
MD5
76461b5f5b53971ee56faeb25cdcd9af
-
SHA1
cde5434ed5f46e711c9c2a30ce195e3c8cc7d590
-
SHA256
c1ef40e8ab20ce2ae541a4b2a21de4ccedd94a212d049b39ea392959cecb0106
-
SHA512
ac45584da5b4fdc326d642e10ed2328bc804291999ebe7a23bd6ae378389abb42676f6a90f863ae3fef17f783e347dfe74a2eef12ef6e24e002559fb43bdd10f
-
SSDEEP
6144:HoyDeQWPJ80bynilzMLwDaHhyvHr82Vqx+DBtBukOTWa1s/zGup+9n0Ixpfj3tla:jxTMW74c2BtUhm0ZL9O/jTLb/cXo/
Malware Config
Extracted
icedid
361893872
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 60 4376 rundll32.exe 66 4376 rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation WScript.exe -
Loads dropped DLL 2 IoCs
pid Process 3440 regsvr32.exe 4376 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000_Classes\CLSID\{2E57A065-100F-0007-0263-61A4BB5FA8DB} rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000_Classes\CLSID\{2E57A065-100F-0007-0263-61A4BB5FA8DB}\ = 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 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3440 regsvr32.exe 3440 regsvr32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2104 wrote to memory of 3440 2104 WScript.exe 81 PID 2104 wrote to memory of 3440 2104 WScript.exe 81 PID 3440 wrote to memory of 5052 3440 regsvr32.exe 84 PID 3440 wrote to memory of 5052 3440 regsvr32.exe 84 PID 5052 wrote to memory of 4376 5052 cmd.exe 86 PID 5052 wrote to memory of 4376 5052 cmd.exe 86 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\c1ef40e8ab20ce2ae541a4b2a21de4ccedd94a212d049b39ea392959cecb0106_JC.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" C://windows/Temp/0247-1.dll2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C rundll32.exe C:\Users\Admin\AppData\Local\{FD3382B2-0E8E-FCFD-1A44-9A224B7C74E7}\enrofamc64\Kecuesacob.dll,#13⤵
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\{FD3382B2-0E8E-FCFD-1A44-9A224B7C74E7}\enrofamc64\Kecuesacob.dll,#14⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Modifies registry class
PID:4376
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
556KB
MD5002c64d47bf8c0878ac8ec2b4740f682
SHA1acc44c89420270083de7d67b025748a4b98071ed
SHA256b4f17e438636e166a94b2cd7c83e1c2b3cf1184122b6204521c1024e293ba8b1
SHA51280f44373c7dc7a08d94b65e1f830e6d922ae9b8fefca5beadaf6a1a8c33622219da404bed11daeb7de03f1b3432782a11cd019ff814b981b9e6885066666affd
-
Filesize
556KB
MD5002c64d47bf8c0878ac8ec2b4740f682
SHA1acc44c89420270083de7d67b025748a4b98071ed
SHA256b4f17e438636e166a94b2cd7c83e1c2b3cf1184122b6204521c1024e293ba8b1
SHA51280f44373c7dc7a08d94b65e1f830e6d922ae9b8fefca5beadaf6a1a8c33622219da404bed11daeb7de03f1b3432782a11cd019ff814b981b9e6885066666affd
-
Filesize
328KB
MD50f2b420baa4b27a7393f25ca264c177f
SHA15760aeeb262b180bf0cae07f51f4203441576a51
SHA2562e0ae1ad86ecde68ab4a312e083ef2076e12e321f62fb0eb802ff8a183800036
SHA5128d73400f23749e80fa055ac5e7dfc8926de5795e5b7c9a6d7c2b37da5d9e6e5225854f98cd0711d8fa225b4d41159b4db168b5d6b52a2e2352c4e3fc900205d0
-
Filesize
328KB
MD50f2b420baa4b27a7393f25ca264c177f
SHA15760aeeb262b180bf0cae07f51f4203441576a51
SHA2562e0ae1ad86ecde68ab4a312e083ef2076e12e321f62fb0eb802ff8a183800036
SHA5128d73400f23749e80fa055ac5e7dfc8926de5795e5b7c9a6d7c2b37da5d9e6e5225854f98cd0711d8fa225b4d41159b4db168b5d6b52a2e2352c4e3fc900205d0