Analysis

  • max time kernel
    130s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    04-04-2021 11:52

General

  • Target

    vict.exe

  • Size

    1.5MB

  • MD5

    1fe5a78b062c229be63d1d69770fb04f

  • SHA1

    220b0f77946840c832f6913ae05a1bbe26c95e54

  • SHA256

    fc79c071ab08ab2fe68ac0361e340d8e3fc047d823392e4d3df25823d22acf78

  • SHA512

    23aedb7bdc329469f0e577eb44a0a0d8da59c6d5bc6c5f77a51378640ebe2772217e61f81ab060473e7a03e97554fdd9392254860c2b61d212cb2e99aa1eee1e

Malware Config

Extracted

Family

icedid

Campaign

2412332838

C2

gaaga923.website

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • IcedID First Stage Loader 1 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\vict.exe
    "C:\Users\Admin\AppData\Local\Temp\vict.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:500
    • C:\Users\Admin\AppData\Local\Temp\is-I85ET.tmp\vict.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-I85ET.tmp\vict.tmp" /SL5="$6005E,870426,780800,C:\Users\Admin\AppData\Local\Temp\vict.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2036
      • C:\Users\Admin\AppData\Local\Temp\vict.exe
        "C:\Users\Admin\AppData\Local\Temp\vict.exe" /SILENT
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2712
        • C:\Users\Admin\AppData\Local\Temp\is-OINTK.tmp\vict.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-OINTK.tmp\vict.tmp" /SL5="$7005E,870426,780800,C:\Users\Admin\AppData\Local\Temp\vict.exe" /SILENT
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Program Files directory
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2776
          • C:\Users\Admin\AppData\Local\Temp\is-DO4P9.tmp\win1host.exe
            "C:\Users\Admin\AppData\Local\Temp\is-DO4P9.tmp\win1host.exe" terteretrr
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2928
            • C:\Users\Admin\AppData\Local\Temp\LkJP9xvRO.exe
              "C:\Users\Admin\AppData\Local\Temp\LkJP9xvRO.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:2772
              • C:\Windows\SysWOW64\at.exe
                "C:\Windows\System32\at.exe"
                7⤵
                  PID:1512
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c C:\Windows\System32\cmd.exe < Marito.gif
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2068
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\System32\cmd.exe
                    8⤵
                    • Suspicious use of WriteProcessMemory
                    PID:3888
                    • C:\Windows\SysWOW64\findstr.exe
                      findstr /V /R "^CaWSaeSvAdYkfzbpRfhIGeKeRfokmseCgqWsHlzIpUNnKXGDsJAgYjEmITwrUHXogvWfbyBGVFmLfksUIFTQRNDevvJNpd$" Amai.gif
                      9⤵
                        PID:2328
                      • C:\Users\Admin\AppData\Roaming\wipetKbAeQHS\Suono.exe.com
                        Suono.exe.com U
                        9⤵
                        • Executes dropped EXE
                        • Suspicious use of WriteProcessMemory
                        PID:1428
                        • C:\Users\Admin\AppData\Roaming\wipetKbAeQHS\Suono.exe.com
                          C:\Users\Admin\AppData\Roaming\wipetKbAeQHS\Suono.exe.com U
                          10⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • Suspicious behavior: MapViewOfSection
                          • Suspicious use of WriteProcessMemory
                          PID:2160
                          • C:\Windows\SysWOW64\schtasks.exe
                            schtasks.exe /create /tn "mLdghlcqNQ" /tr "C:\\Users\\Admin\\AppData\\Roaming\\ThUbGJfUzN\\mLdghlcqNQ.exe.com C:\\Users\\Admin\\AppData\\Roaming\\ThUbGJfUzN\\s" /sc onstart /F /RU SYSTEM
                            11⤵
                            • Creates scheduled task(s)
                            PID:2840
                          • C:\Users\Admin\AppData\Roaming\wipetKbAeQHS\nslookup.exe
                            C:\Users\Admin\AppData\Roaming\wipetKbAeQHS\nslookup.exe
                            11⤵
                            • Executes dropped EXE
                            • Suspicious use of WriteProcessMemory
                            PID:2920
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\System32\cmd.exe /c start C:\Windows\System32\rundll32.exe vcredist_64.dll,DllRegisterServer
                              12⤵
                              • Suspicious use of WriteProcessMemory
                              PID:3940
                              • C:\Windows\SysWOW64\rundll32.exe
                                C:\Windows\System32\rundll32.exe vcredist_64.dll,DllRegisterServer
                                13⤵
                                • Loads dropped DLL
                                • Suspicious use of WriteProcessMemory
                                PID:2212
                                • C:\Windows\system32\rundll32.exe
                                  C:\Windows\System32\rundll32.exe vcredist_64.dll,DllRegisterServer
                                  14⤵
                                  • Blocklisted process makes network request
                                  • Loads dropped DLL
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:1272
                      • C:\Windows\SysWOW64\PING.EXE
                        ping 127.0.0.1 -n 30
                        9⤵
                        • Runs ping.exe
                        PID:2088
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2928 -s 548
                  6⤵
                  • Suspicious use of NtCreateProcessExOtherParentProcess
                  • Program crash
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1480

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Scheduled Task

      1
      T1053

      Persistence

      Scheduled Task

      1
      T1053

      Privilege Escalation

      Scheduled Task

      1
      T1053

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      1
      T1082

      Remote System Discovery

      1
      T1018

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\LkJP9xvRO.exe
        MD5

        d9fa049575abf28baf2d06080a2b9080

        SHA1

        ac90936fcb5871bb79076730ecbcad66bd69b689

        SHA256

        ee8294e87cfec9193c06ca8747ac86c6392aa09c5e61346e67d692a140d34909

        SHA512

        138636f3f0896ce349cc0ae5d0455b7acd938b47eb801d69ee5bbff6e4bb2fb521310983466faeb7f4db19c38c451c8179a1dd1b3bbffd52aaac58bc47dcd7be

      • C:\Users\Admin\AppData\Local\Temp\LkJP9xvRO.exe
        MD5

        d9fa049575abf28baf2d06080a2b9080

        SHA1

        ac90936fcb5871bb79076730ecbcad66bd69b689

        SHA256

        ee8294e87cfec9193c06ca8747ac86c6392aa09c5e61346e67d692a140d34909

        SHA512

        138636f3f0896ce349cc0ae5d0455b7acd938b47eb801d69ee5bbff6e4bb2fb521310983466faeb7f4db19c38c451c8179a1dd1b3bbffd52aaac58bc47dcd7be

      • C:\Users\Admin\AppData\Local\Temp\is-DO4P9.tmp\win1host.exe
        MD5

        fe2f53642abb64acb8b7cbc47daf9472

        SHA1

        d99bb0f9cf06e3e3da736797198b2e57eacebbfc

        SHA256

        0fb9b4d12542494d40c4902f3163803102d2c034a92c7252b89ce955c427f03b

        SHA512

        e1a4631afd164e226542f99e8e77428b616b05c6f3dd43c5938ba5d933d63a214c311a24ce4d4bcd644c879c820ae9f18948b27e4524b3f01c96cb1414e9cbfe

      • C:\Users\Admin\AppData\Local\Temp\is-DO4P9.tmp\win1host.exe
        MD5

        fe2f53642abb64acb8b7cbc47daf9472

        SHA1

        d99bb0f9cf06e3e3da736797198b2e57eacebbfc

        SHA256

        0fb9b4d12542494d40c4902f3163803102d2c034a92c7252b89ce955c427f03b

        SHA512

        e1a4631afd164e226542f99e8e77428b616b05c6f3dd43c5938ba5d933d63a214c311a24ce4d4bcd644c879c820ae9f18948b27e4524b3f01c96cb1414e9cbfe

      • C:\Users\Admin\AppData\Local\Temp\is-I85ET.tmp\vict.tmp
        MD5

        6359179068bf26bd5a55d22a3b81777c

        SHA1

        4250579b8d1a1b9b8219e42bd183d7f2643089a3

        SHA256

        397dfb61352aa7e19257dd8b7e52e54771fba767ec4a6a2629acf15e73ab0c08

        SHA512

        1c43843dad4099aa6a94f6b743d43f14b9ccb52a7934157e7f983d91c906333ddc8be9854dbb435f9eaf3ae0437ba828f9b4670db907798c3657b9c538817c2c

      • C:\Users\Admin\AppData\Local\Temp\is-OINTK.tmp\vict.tmp
        MD5

        6359179068bf26bd5a55d22a3b81777c

        SHA1

        4250579b8d1a1b9b8219e42bd183d7f2643089a3

        SHA256

        397dfb61352aa7e19257dd8b7e52e54771fba767ec4a6a2629acf15e73ab0c08

        SHA512

        1c43843dad4099aa6a94f6b743d43f14b9ccb52a7934157e7f983d91c906333ddc8be9854dbb435f9eaf3ae0437ba828f9b4670db907798c3657b9c538817c2c

      • C:\Users\Admin\AppData\Local\Temp\is-OINTK.tmp\vict.tmp
        MD5

        6359179068bf26bd5a55d22a3b81777c

        SHA1

        4250579b8d1a1b9b8219e42bd183d7f2643089a3

        SHA256

        397dfb61352aa7e19257dd8b7e52e54771fba767ec4a6a2629acf15e73ab0c08

        SHA512

        1c43843dad4099aa6a94f6b743d43f14b9ccb52a7934157e7f983d91c906333ddc8be9854dbb435f9eaf3ae0437ba828f9b4670db907798c3657b9c538817c2c

      • C:\Users\Admin\AppData\Roaming\wipetKbAeQHS\Amai.gif
        MD5

        606c84cbe58e8413a23de79a135f8b14

        SHA1

        78277d63523550feb5a38ed81d0a7e067acc9474

        SHA256

        56873d5e811646396347047bec9196f250a7a5a0c3e7f30f43eb854684376a0e

        SHA512

        8b6a42cbdf3675c195034584b08deeda66145f7b3ed52858180ea5061d54a1e2def70da218eeec54f96b3e27b3412495b969c211793f91e2cf80847bcb440a12

      • C:\Users\Admin\AppData\Roaming\wipetKbAeQHS\Marito.gif
        MD5

        1a73e1b2de876a1ee2941907f8ad4134

        SHA1

        0d2483d0a100bffd14403ec8f59a353d56e89a19

        SHA256

        9b664434809427823f190a3b18d42acd11d25ba364075725b1549faf784da9e9

        SHA512

        994253badd8e17452a46644e706f89016c0c591f6ef213ceac23462fff7d35e217bf789e2e9a164057b961cf938839f5d4bff39a8c9b9c7bf6e914e8e214d8f3

      • C:\Users\Admin\AppData\Roaming\wipetKbAeQHS\Suono.exe.com
        MD5

        78ba0653a340bac5ff152b21a83626cc

        SHA1

        b12da9cb5d024555405040e65ad89d16ae749502

        SHA256

        05d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7

        SHA512

        efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317

      • C:\Users\Admin\AppData\Roaming\wipetKbAeQHS\Suono.exe.com
        MD5

        78ba0653a340bac5ff152b21a83626cc

        SHA1

        b12da9cb5d024555405040e65ad89d16ae749502

        SHA256

        05d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7

        SHA512

        efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317

      • C:\Users\Admin\AppData\Roaming\wipetKbAeQHS\Suono.exe.com
        MD5

        78ba0653a340bac5ff152b21a83626cc

        SHA1

        b12da9cb5d024555405040e65ad89d16ae749502

        SHA256

        05d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7

        SHA512

        efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317

      • C:\Users\Admin\AppData\Roaming\wipetKbAeQHS\U
        MD5

        23927dc0f409ed998394c4c64fca455a

        SHA1

        11b1fde2dd60b95f8ba4dc853832631699e4b1de

        SHA256

        f496cf57a0c2d53249066eee0dac2ffc6b82c0c0af64b781baee2ffc64f8cc92

        SHA512

        987935777679b72707b839d3b13dfd46296268ab23399b492ca65bffcd14d9b32ca19eca93198e065779d7890a683c9015f8e42e5b36df5eee1f53b101399cde

      • C:\Users\Admin\AppData\Roaming\wipetKbAeQHS\Vieni.gif
        MD5

        ae210c5a9986782e7d09c01c21b809a1

        SHA1

        2547c12132150c30147a04fb479f17f66fe47376

        SHA256

        ac9de7cfab8fde65e48e7b5e1bd660cbdfc2b0825899392acc6dbda376b2109b

        SHA512

        32130fdb198cbdeaa85da9a37e61ef93efa1f2e10fe87f92ac690710dbee8b66be17bbff98a847cff196cc30495b6a80bd53372212134312179855c679915850

      • C:\Users\Admin\AppData\Roaming\wipetKbAeQHS\Voi.gif
        MD5

        23927dc0f409ed998394c4c64fca455a

        SHA1

        11b1fde2dd60b95f8ba4dc853832631699e4b1de

        SHA256

        f496cf57a0c2d53249066eee0dac2ffc6b82c0c0af64b781baee2ffc64f8cc92

        SHA512

        987935777679b72707b839d3b13dfd46296268ab23399b492ca65bffcd14d9b32ca19eca93198e065779d7890a683c9015f8e42e5b36df5eee1f53b101399cde

      • C:\Users\Admin\AppData\Roaming\wipetKbAeQHS\nslookup.exe
        MD5

        df4be7914c0ec7923e5740f44f629ff8

        SHA1

        84ec0080330f4d812755c901b01a3500874c9d36

        SHA256

        c375b41006ca84f7a3ba98e4284f714c48d98b5fba5010034825bf4713ab76fa

        SHA512

        e2c92f6b9df16431c8f83e96ae8f2a1761857248b9189e76fd1a1d2cbbfe3e46ffed7fcb7c972533245c44d77f0cefeef951442f17d3eb5e4373e838f3a86fc5

      • C:\Users\Admin\AppData\Roaming\wipetKbAeQHS\nslookup.exe
        MD5

        df4be7914c0ec7923e5740f44f629ff8

        SHA1

        84ec0080330f4d812755c901b01a3500874c9d36

        SHA256

        c375b41006ca84f7a3ba98e4284f714c48d98b5fba5010034825bf4713ab76fa

        SHA512

        e2c92f6b9df16431c8f83e96ae8f2a1761857248b9189e76fd1a1d2cbbfe3e46ffed7fcb7c972533245c44d77f0cefeef951442f17d3eb5e4373e838f3a86fc5

      • C:\Users\Admin\AppData\Roaming\wipetKbAeQHS\vcredist_64.dll
        MD5

        2c4784e618e065b072371bb2e24ef11d

        SHA1

        93dcb9355ec4846a1107cb608abeb5b24aa5c72a

        SHA256

        784ee92895e1e33403d4abdcc2cfd4a0ec50f20b3844c3d1d2aac11136efb172

        SHA512

        065ba98ece735f4383e5ee111a55a8854419312019548e27999a714867e0962e58c5936afaeb39e201590597e0ac3337415dd9ce88d375c5fbd4c0e7a30f3f7b

      • \Users\Admin\AppData\Local\Temp\is-DO4P9.tmp\idp.dll
        MD5

        55c310c0319260d798757557ab3bf636

        SHA1

        0892eb7ed31d8bb20a56c6835990749011a2d8de

        SHA256

        54e7e0ad32a22b775131a6288f083ed3286a9a436941377fc20f85dd9ad983ed

        SHA512

        e0082109737097658677d7963cbf28d412dca3fa8f5812c2567e53849336ce45ebae2c0430df74bfe16c0f3eebb46961bc1a10f32ca7947692a900162128ae57

      • \Users\Admin\AppData\Local\Temp\is-U0ADB.tmp\idp.dll
        MD5

        55c310c0319260d798757557ab3bf636

        SHA1

        0892eb7ed31d8bb20a56c6835990749011a2d8de

        SHA256

        54e7e0ad32a22b775131a6288f083ed3286a9a436941377fc20f85dd9ad983ed

        SHA512

        e0082109737097658677d7963cbf28d412dca3fa8f5812c2567e53849336ce45ebae2c0430df74bfe16c0f3eebb46961bc1a10f32ca7947692a900162128ae57

      • \Users\Admin\AppData\Roaming\wipetKbAeQHS\vcredist_64.dll
        MD5

        2c4784e618e065b072371bb2e24ef11d

        SHA1

        93dcb9355ec4846a1107cb608abeb5b24aa5c72a

        SHA256

        784ee92895e1e33403d4abdcc2cfd4a0ec50f20b3844c3d1d2aac11136efb172

        SHA512

        065ba98ece735f4383e5ee111a55a8854419312019548e27999a714867e0962e58c5936afaeb39e201590597e0ac3337415dd9ce88d375c5fbd4c0e7a30f3f7b

      • \Users\Admin\AppData\Roaming\wipetKbAeQHS\vcredist_64.dll
        MD5

        2c4784e618e065b072371bb2e24ef11d

        SHA1

        93dcb9355ec4846a1107cb608abeb5b24aa5c72a

        SHA256

        784ee92895e1e33403d4abdcc2cfd4a0ec50f20b3844c3d1d2aac11136efb172

        SHA512

        065ba98ece735f4383e5ee111a55a8854419312019548e27999a714867e0962e58c5936afaeb39e201590597e0ac3337415dd9ce88d375c5fbd4c0e7a30f3f7b

      • memory/500-4-0x0000000000401000-0x00000000004B7000-memory.dmp
        Filesize

        728KB

      • memory/1272-48-0x0000018689C00000-0x0000018689C07000-memory.dmp
        Filesize

        28KB

      • memory/1272-46-0x0000000000000000-mapping.dmp
      • memory/1428-27-0x0000000000000000-mapping.dmp
      • memory/1480-49-0x0000000004470000-0x0000000004471000-memory.dmp
        Filesize

        4KB

      • memory/1512-20-0x0000000000000000-mapping.dmp
      • memory/2036-5-0x0000000000C40000-0x0000000000C41000-memory.dmp
        Filesize

        4KB

      • memory/2036-2-0x0000000000000000-mapping.dmp
      • memory/2068-21-0x0000000000000000-mapping.dmp
      • memory/2088-30-0x0000000000000000-mapping.dmp
      • memory/2160-39-0x0000000000790000-0x0000000000792000-memory.dmp
        Filesize

        8KB

      • memory/2160-38-0x0000000000780000-0x0000000000781000-memory.dmp
        Filesize

        4KB

      • memory/2160-31-0x0000000000000000-mapping.dmp
      • memory/2212-43-0x0000000000000000-mapping.dmp
      • memory/2328-24-0x0000000000000000-mapping.dmp
      • memory/2712-7-0x0000000000000000-mapping.dmp
      • memory/2772-17-0x0000000000000000-mapping.dmp
      • memory/2776-8-0x0000000000000000-mapping.dmp
      • memory/2776-12-0x0000000000800000-0x0000000000801000-memory.dmp
        Filesize

        4KB

      • memory/2840-35-0x0000000000000000-mapping.dmp
      • memory/2920-40-0x0000000000400000-0x0000000000417000-memory.dmp
        Filesize

        92KB

      • memory/2920-36-0x000000000040128D-mapping.dmp
      • memory/2928-14-0x0000000000000000-mapping.dmp
      • memory/3888-23-0x0000000000000000-mapping.dmp
      • memory/3940-42-0x0000000000000000-mapping.dmp