Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 13:02
Static task
static1
Behavioral task
behavioral1
Sample
core/asthma-x64.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
core/asthma-x64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
core/cmd.bat
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
core/cmd.bat
Resource
win10v2004-20241007-en
General
-
Target
core/cmd.bat
-
Size
193B
-
MD5
3a381435fb992cd5ae34c6e84ea6d409
-
SHA1
941e0ee20e5c1fef2f76833d3b060491da17bef0
-
SHA256
4373f87735a69af9812956a8821a3fccac5aa3a6cd0a832973b03da9573a787a
-
SHA512
ba4e0c6fcb543978542294084442a0fe964ec0f093e68814548bcfa93447d82d8a7f232c232380ea051289f81173da0876dee640deafa7bdc83ced2ac02aacfa
Malware Config
Extracted
icedid
1217670233
nnelforwfin.top
lakogrefop.rest
hangetilin.top
essaipienure.space
-
auth_var
6
-
url_path
/posts/
Extracted
icedid
Signatures
-
Icedid family
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe 3152 rundll32.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1556 wrote to memory of 3152 1556 cmd.exe 84 PID 1556 wrote to memory of 3152 1556 cmd.exe 84 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\core\cmd.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\core\asthma-x64.tmp,DllMain --ma="license.dat"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
333KB
MD5b03af34cc11c8bd53afd958c839dd59f
SHA1d9c90d8f770be66850ea0734580867c16d64b404
SHA25671c9c15896b027fd830423f6226587bdad3f09681799bf3e69abb0479f18a853
SHA512c33204f04a99272a1619a4fe6e3ba5e128c437968f8f570c12ffbf20a71e2b617535a70bf51f9d4ddcccc7f44804a13a4528ece4470e4ee53273ad1806313911