Resubmissions

01-12-2022 21:09

221201-zztsnaef7z 10

01-12-2022 21:03

221201-zwbgxaec9t 1

Analysis

  • max time kernel
    356s
  • max time network
    354s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2022 21:09

General

  • Target

    Document_37_Dec1.html

  • Size

    221KB

  • MD5

    3be804323d8ab42ec08a0d4422610087

  • SHA1

    9ecd7fc9ac30ee972ef5437ba822d09c840205ee

  • SHA256

    b0523c2b7ac08e53ec8868e1c1e7575905a43ab3a3be92b259d299233b919291

  • SHA512

    5bcb5c6f1b4ee8bf75747285a7daa3102be6ce9c3587f88ea8e9fea3b2f68485813ca3c321e4730862cb3ad7cf02dd38f5eb8ca1c0ede31554930c00f54acc76

  • SSDEEP

    6144:Qih/ffNwPfOD9NuUNSem3N/DkSf3Yx1VJSxt+ooYuwps:PfNwXxYoAK3Yx3JSxcYZs

Malware Config

Extracted

Family

icedid

Campaign

2271535685

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Blocklisted process makes network request 5 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Mozilla Firefox\firefox.exe
    "C:\Program Files\Mozilla Firefox\firefox.exe" C:\Users\Admin\AppData\Local\Temp\Document_37_Dec1.html
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4872
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe" C:\Users\Admin\AppData\Local\Temp\Document_37_Dec1.html
      2⤵
      • Checks processor information in registry
      • Modifies registry class
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1176
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1176.0.366742112\1611911187" -parentBuildID 20200403170909 -prefsHandle 1692 -prefMapHandle 1684 -prefsLen 1 -prefMapSize 220117 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1176 "\\.\pipe\gecko-crash-server-pipe.1176" 1792 gpu
        3⤵
          PID:620
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1176.3.1990760034\1319215769" -childID 1 -isForBrowser -prefsHandle 2488 -prefMapHandle 2484 -prefsLen 112 -prefMapSize 220117 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1176 "\\.\pipe\gecko-crash-server-pipe.1176" 2496 tab
          3⤵
            PID:3908
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1176.13.2046971192\1267834586" -childID 2 -isForBrowser -prefsHandle 3768 -prefMapHandle 3720 -prefsLen 7599 -prefMapSize 220117 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1176 "\\.\pipe\gecko-crash-server-pipe.1176" 3692 tab
            3⤵
              PID:4680
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1176.20.1064066880\2519426" -childID 3 -isForBrowser -prefsHandle 4632 -prefMapHandle 4612 -prefsLen 7599 -prefMapSize 220117 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1176 "\\.\pipe\gecko-crash-server-pipe.1176" 4644 tab
              3⤵
                PID:2172
          • C:\Windows\System32\rundll32.exe
            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
            1⤵
              PID:876
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /c logfab\phiVj.cmd NAcP
              1⤵
              • Enumerates connected drives
              PID:2272
              • C:\Windows\system32\xcopy.exe
                xcopy /s /i /e /h logfab\offspring.dll C:\Users\Admin\AppData\Local\Temp\*
                2⤵
                  PID:1220
                • C:\Windows\system32\rundll32.exe
                  rundll32 C:\Users\Admin\AppData\Local\Temp\offspring.dll,#1
                  2⤵
                  • Blocklisted process makes network request
                  • Loads dropped DLL
                  PID:4104

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Discovery

              Query Registry

              2
              T1012

              Peripheral Device Discovery

              1
              T1120

              System Information Discovery

              2
              T1082

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\offspring.dll
                Filesize

                161KB

                MD5

                13dc944a91cffd0385e29ea899a43af2

                SHA1

                793cfb6887fd324583ab1df77ff5e96391a3887b

                SHA256

                af5f6f066ffc8c375d6e4d1138d63da32014d7ea21b8b7582da0cd8b97794cbe

                SHA512

                258c0c920f0e76f2b883f967cf73114890f61abbee0824d9b2e913623feaeb53c2b1179bc34df49627fe39459e1d9b20986186015fa0168c7b452eeba7449c39

              • memory/1220-132-0x0000000000000000-mapping.dmp
              • memory/4104-133-0x0000000000000000-mapping.dmp