Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-en-20211104
  • submitted
    12-11-2021 18:00

General

  • Target

    879523aa42d9276f72f17f450468a0ab.virus.exe

  • Size

    28KB

  • MD5

    879523aa42d9276f72f17f450468a0ab

  • SHA1

    f772c2bf9c24ca62750f69cf6ac605179be85622

  • SHA256

    0ef7f2b1ab7ad7e4c3124a981dc4f0ca9bcbbc2194573ae5d678df65fd24c69a

  • SHA512

    8be1594e6e5f2eb3ad65c61f8d0f9775c287dd4889f778517dd46f432a404626f00b81b82c687ace028576632f9abb4fa94244f7f755e077a4eaa112ff611fde

Malware Config

Extracted

Family

icedid

Campaign

949083261

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • suricata: ET MALWARE Win32/IcedID Request Cookie

    suricata: ET MALWARE Win32/IcedID Request Cookie

  • suricata: ET MALWARE Win32/IcedID Requesting Encoded Binary M4

    suricata: ET MALWARE Win32/IcedID Requesting Encoded Binary M4

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\879523aa42d9276f72f17f450468a0ab.virus.exe
    "C:\Users\Admin\AppData\Local\Temp\879523aa42d9276f72f17f450468a0ab.virus.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    PID:964

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads