Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
13-05-2022 00:33
Static task
static1
Behavioral task
behavioral1
Sample
1d8bb9ad72663a648e97e982181c3b34563c3a7b438f6ec11814a4b7f255bc95.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1d8bb9ad72663a648e97e982181c3b34563c3a7b438f6ec11814a4b7f255bc95.exe
Resource
win10v2004-20220414-en
General
-
Target
1d8bb9ad72663a648e97e982181c3b34563c3a7b438f6ec11814a4b7f255bc95.exe
-
Size
83KB
-
MD5
a9a09b7690af936793d55af919f1725d
-
SHA1
5f8b2c4715f45357e3e2376e309a472683086829
-
SHA256
1d8bb9ad72663a648e97e982181c3b34563c3a7b438f6ec11814a4b7f255bc95
-
SHA512
a51725e82169d8369e722fd602134f2945073cbeedb800d440caf3d08204025eb79ccc9f82afc5c4be8235571ee5929f88ed384c2cfb101419caa891114bede7
Malware Config
Extracted
icedid
3055369807
yellwells.com
Signatures
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
1d8bb9ad72663a648e97e982181c3b34563c3a7b438f6ec11814a4b7f255bc95.exedescription pid process target process PID 4552 set thread context of 4772 4552 1d8bb9ad72663a648e97e982181c3b34563c3a7b438f6ec11814a4b7f255bc95.exe vbc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
vbc.exepid process 4772 vbc.exe 4772 vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1d8bb9ad72663a648e97e982181c3b34563c3a7b438f6ec11814a4b7f255bc95.exedescription pid process Token: SeDebugPrivilege 4552 1d8bb9ad72663a648e97e982181c3b34563c3a7b438f6ec11814a4b7f255bc95.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
1d8bb9ad72663a648e97e982181c3b34563c3a7b438f6ec11814a4b7f255bc95.exedescription pid process target process PID 4552 wrote to memory of 4772 4552 1d8bb9ad72663a648e97e982181c3b34563c3a7b438f6ec11814a4b7f255bc95.exe vbc.exe PID 4552 wrote to memory of 4772 4552 1d8bb9ad72663a648e97e982181c3b34563c3a7b438f6ec11814a4b7f255bc95.exe vbc.exe PID 4552 wrote to memory of 4772 4552 1d8bb9ad72663a648e97e982181c3b34563c3a7b438f6ec11814a4b7f255bc95.exe vbc.exe PID 4552 wrote to memory of 4772 4552 1d8bb9ad72663a648e97e982181c3b34563c3a7b438f6ec11814a4b7f255bc95.exe vbc.exe PID 4552 wrote to memory of 4772 4552 1d8bb9ad72663a648e97e982181c3b34563c3a7b438f6ec11814a4b7f255bc95.exe vbc.exe PID 4552 wrote to memory of 4772 4552 1d8bb9ad72663a648e97e982181c3b34563c3a7b438f6ec11814a4b7f255bc95.exe vbc.exe PID 4552 wrote to memory of 4772 4552 1d8bb9ad72663a648e97e982181c3b34563c3a7b438f6ec11814a4b7f255bc95.exe vbc.exe PID 4552 wrote to memory of 4772 4552 1d8bb9ad72663a648e97e982181c3b34563c3a7b438f6ec11814a4b7f255bc95.exe vbc.exe PID 4552 wrote to memory of 4772 4552 1d8bb9ad72663a648e97e982181c3b34563c3a7b438f6ec11814a4b7f255bc95.exe vbc.exe PID 4552 wrote to memory of 4772 4552 1d8bb9ad72663a648e97e982181c3b34563c3a7b438f6ec11814a4b7f255bc95.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d8bb9ad72663a648e97e982181c3b34563c3a7b438f6ec11814a4b7f255bc95.exe"C:\Users\Admin\AppData\Local\Temp\1d8bb9ad72663a648e97e982181c3b34563c3a7b438f6ec11814a4b7f255bc95.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4772