Resubmissions

17-05-2021 10:59

210517-kcce3f4rts 10

12-05-2021 20:31

210512-1xg8d2asge 10

Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    12-05-2021 20:31

General

  • Target

    3cdbae46394cd70b74ec9969b270f223ae78f770013cbec0839935eb28a08b5d.doc

Malware Config

Extracted

Family

icedid

Campaign

2857955836

C2

wasthuliok.live

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 4 IoCs
  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\3cdbae46394cd70b74ec9969b270f223ae78f770013cbec0839935eb28a08b5d.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1096
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1600
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
      1⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1852
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32 c:\programdata\loadTempLoad.jpg,PluginInit
        2⤵
        • Process spawned unexpected child process
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:856
        • C:\Windows\system32\rundll32.exe
          rundll32 c:\programdata\loadTempLoad.jpg,PluginInit
          3⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          PID:1740

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\MSO1033.acl
      MD5

      dbc72f99f1598112e74eb18f7f6260ec

      SHA1

      c483ef847c906fdc371927740eb603570a451ab7

      SHA256

      e6520294b3e3a266b47f7453ea3110b820ced28fcb9bd1ddbc20caeec69b2cc6

      SHA512

      5f0de55269f44f1f65f475fd9da8e4f407c20988857c8ea5014e5049d34b161da143f09716476df8174b08ea0ae68dbfb9c4d6501dfc5553f608fa80a008f460

    • \??\c:\programdata\loadTempLoad.jpg
      MD5

      c6be818b2fa5509a29c42aa01916e33c

      SHA1

      21321567273d16fd5a416def343eaab8d050c258

      SHA256

      52dfc0f3ffb6a26f5247db4d499c5a6316191f34303cd8792862d1a4ea5ef24f

      SHA512

      d436e1fd4a1ca674665f487b46fbb4808bd92320714deb84e39a6fa2f01c0d5e5c96184e99487f5e3e90cff72bd03e8a70608b190dffd5bac926c287d818ca1f

    • \ProgramData\loadTempLoad.jpg
      MD5

      c6be818b2fa5509a29c42aa01916e33c

      SHA1

      21321567273d16fd5a416def343eaab8d050c258

      SHA256

      52dfc0f3ffb6a26f5247db4d499c5a6316191f34303cd8792862d1a4ea5ef24f

      SHA512

      d436e1fd4a1ca674665f487b46fbb4808bd92320714deb84e39a6fa2f01c0d5e5c96184e99487f5e3e90cff72bd03e8a70608b190dffd5bac926c287d818ca1f

    • \ProgramData\loadTempLoad.jpg
      MD5

      c6be818b2fa5509a29c42aa01916e33c

      SHA1

      21321567273d16fd5a416def343eaab8d050c258

      SHA256

      52dfc0f3ffb6a26f5247db4d499c5a6316191f34303cd8792862d1a4ea5ef24f

      SHA512

      d436e1fd4a1ca674665f487b46fbb4808bd92320714deb84e39a6fa2f01c0d5e5c96184e99487f5e3e90cff72bd03e8a70608b190dffd5bac926c287d818ca1f

    • memory/856-68-0x0000000075561000-0x0000000075563000-memory.dmp
      Filesize

      8KB

    • memory/856-67-0x0000000000000000-mapping.dmp
    • memory/1096-62-0x0000000005DA0000-0x00000000069EA000-memory.dmp
      Filesize

      12.3MB

    • memory/1096-59-0x0000000072381000-0x0000000072384000-memory.dmp
      Filesize

      12KB

    • memory/1096-61-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1096-60-0x000000006FE01000-0x000000006FE03000-memory.dmp
      Filesize

      8KB

    • memory/1600-75-0x0000000000000000-mapping.dmp
    • memory/1600-76-0x000007FEFB881000-0x000007FEFB883000-memory.dmp
      Filesize

      8KB

    • memory/1740-71-0x0000000000000000-mapping.dmp
    • memory/1740-73-0x0000000001B20000-0x0000000001B7B000-memory.dmp
      Filesize

      364KB

    • memory/1852-74-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB