Resubmissions

11-11-2021 12:40

211111-pwejfsgdcp 10

07-11-2021 19:52

211107-yldzlsgbfp 10

Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    11-11-2021 12:40

General

  • Target

    5C733D57143D5FD9777DAEE8AEC2E907DBF31BA9ACB97.exe

  • Size

    1.2MB

  • MD5

    37fa9f54837a71c9fc640ac78cac9646

  • SHA1

    4177211a427d5710e02ce37b2fdc4ef62b174067

  • SHA256

    5c733d57143d5fd9777daee8aec2e907dbf31ba9acb97ed1a3ae9cbcd3bc01d3

  • SHA512

    f99e17855f15f78c7bbc47d2141a2be8e3e5a9acfbed26c4ffbda6d5bfaea990ecbb00c9e69cb60402b7235fb1482216c51ca5542cec7f877e82ae62cf9761b6

Malware Config

Extracted

Family

icedid

Campaign

949083261

C2

kitchenbiggy.best

Signatures

  • ICEDID gziploader 2021 1 IoCs

    gziploader.

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • suricata: ET MALWARE Win32/IcedID Request Cookie

    suricata: ET MALWARE Win32/IcedID Request Cookie

  • suricata: ET MALWARE Win32/IcedID Requesting Encoded Binary M4

    suricata: ET MALWARE Win32/IcedID Requesting Encoded Binary M4

  • IcedID First Stage Loader 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5C733D57143D5FD9777DAEE8AEC2E907DBF31BA9ACB97.exe
    "C:\Users\Admin\AppData\Local\Temp\5C733D57143D5FD9777DAEE8AEC2E907DBF31BA9ACB97.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    PID:1360

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1360-55-0x0000000140000000-0x0000000140007000-memory.dmp
    Filesize

    28KB