Analysis

  • max time kernel
    96s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-12-2022 17:53

General

  • Target

    Setup_Win_16-12-2022_16-47-34.msi

  • Size

    1.6MB

  • MD5

    392916da17e4ef4d8c88c778cf75db5a

  • SHA1

    1996bc54416273a26bf938a713f9f35a5aae68a8

  • SHA256

    e8b323a81faf2904459bb4a35bc8e2519850afc9f960ffd06a22f3e197185a9a

  • SHA512

    4c554f32906b3ce50633628afac4a3984f8e5f4039f185d4d8d6d653aa35d6df2eae860d4a64a08e94c4cd4283d56e5118ab5447f2fa53b590ad1cde638b182d

  • SSDEEP

    24576:7HL0HvwglMtNroES7S8asBci5cRMyBAUIqw5NOcH9iIDMNUEer0OVTm10ku2w:7r0YglMbr3SWpsWjRMMKIIDB/k

Malware Config

Extracted

Family

icedid

Campaign

1228806356

C2

klepdrafooip.com

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Blocklisted process makes network request 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 3 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Setup_Win_16-12-2022_16-47-34.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2280
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:704
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:868
      • C:\Windows\System32\MsiExec.exe
        C:\Windows\System32\MsiExec.exe -Embedding 5040113E803CCA7313A477972BD8C243
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:4864
        • C:\Windows\system32\rundll32.exe
          rundll32.exe "C:\Windows\Installer\MSIFBDA.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240581718 2 test.cs!X1X3X2.Y1yY.Z3z1Z
          3⤵
          • Checks computer location settings
          • Loads dropped DLL
          • Drops file in Windows directory
          • Suspicious use of WriteProcessMemory
          PID:4992
          • C:\Windows\System32\rundll32.exe
            "C:\Windows\System32\rundll32.exe" "C:\Users\Admin\AppData\Local\MSIea16e36c.msi",init
            4⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            PID:4788
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:204

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    3
    T1012

    System Information Discovery

    4
    T1082

    Peripheral Device Discovery

    2
    T1120

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\MSIea16e36c.msi
      Filesize

      1.2MB

      MD5

      2e39f1486c47b0ea7f3a03b01963c801

      SHA1

      39774ad2b8251f80647eac7df69aaca01a9d9502

      SHA256

      cd65a3c349da4da45a26d8d4e3c07ef4045679feb458221a391375e3e328d52d

      SHA512

      0412565a0df35037a93deaa2621a9b379deb053d488c4cc24492dae6bee6dde34ad23976830c616dd2ecd2dbcbbb373cb2fc18392f36634b7fba7899eca9c7ae

    • C:\Users\Admin\AppData\Local\MSIea16e36c.msi
      Filesize

      1.2MB

      MD5

      2e39f1486c47b0ea7f3a03b01963c801

      SHA1

      39774ad2b8251f80647eac7df69aaca01a9d9502

      SHA256

      cd65a3c349da4da45a26d8d4e3c07ef4045679feb458221a391375e3e328d52d

      SHA512

      0412565a0df35037a93deaa2621a9b379deb053d488c4cc24492dae6bee6dde34ad23976830c616dd2ecd2dbcbbb373cb2fc18392f36634b7fba7899eca9c7ae

    • C:\Windows\Installer\MSIFBDA.tmp
      Filesize

      414KB

      MD5

      70df6dba7c06a4352493b4ba091f903b

      SHA1

      867c42e5a34517c23a1fc0521657c8aa8c56ce73

      SHA256

      28784b9fd983e17834d8026b8ea8fcdef49fb9fd0808be02ee6360a698dbdd0c

      SHA512

      38c22e0079d7835b0004a0cee7179a376d21691d6940ebd7f62d3a5f047fd92bcae1c2190be0b8599feaf8078c981b460dd5b53d4f476ba726c7f0b4e2209850

    • C:\Windows\Installer\MSIFBDA.tmp
      Filesize

      414KB

      MD5

      70df6dba7c06a4352493b4ba091f903b

      SHA1

      867c42e5a34517c23a1fc0521657c8aa8c56ce73

      SHA256

      28784b9fd983e17834d8026b8ea8fcdef49fb9fd0808be02ee6360a698dbdd0c

      SHA512

      38c22e0079d7835b0004a0cee7179a376d21691d6940ebd7f62d3a5f047fd92bcae1c2190be0b8599feaf8078c981b460dd5b53d4f476ba726c7f0b4e2209850

    • C:\Windows\Installer\MSIFBDA.tmp
      Filesize

      414KB

      MD5

      70df6dba7c06a4352493b4ba091f903b

      SHA1

      867c42e5a34517c23a1fc0521657c8aa8c56ce73

      SHA256

      28784b9fd983e17834d8026b8ea8fcdef49fb9fd0808be02ee6360a698dbdd0c

      SHA512

      38c22e0079d7835b0004a0cee7179a376d21691d6940ebd7f62d3a5f047fd92bcae1c2190be0b8599feaf8078c981b460dd5b53d4f476ba726c7f0b4e2209850

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2
      Filesize

      23.0MB

      MD5

      d94aa059ea78d46889ddf808a87fb04c

      SHA1

      b22a9b59238bddf399699baedacfafd7909b5da5

      SHA256

      7683fa48155e68c0eb0a2f27bccd2a9d333c0fedeef4fbd198f7fa3b92289e44

      SHA512

      3222d745cad825b0e936e6d5c6385ee9dce8cd914f775c9e335b000f0ece08bffd384de700e773df2952f7e66cbe5e52d519fe699fcf610eb5fb0e26645bdc73

    • \??\Volume{2fb4ccdc-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{f6288126-5700-4c9e-bef5-d79f2ce8711d}_OnDiskSnapshotProp
      Filesize

      5KB

      MD5

      1e6d5c9b60f49e0b3a44c9fae3295c1f

      SHA1

      db5c984571241644d59f7abe6b83c1a5e55998b0

      SHA256

      20d2a839435059ecf0ff4de937b304ab48756ce06efc1d9a233ca5f6aeca657e

      SHA512

      1c35ee327eb339a623d4a22377ff274189e814ded68b420c6b52b86b164b8e41bffaa65477dfe593ab0875f9a9244091375ec48fa7abf47c458743daf26a94d8

    • memory/868-132-0x0000000000000000-mapping.dmp
    • memory/4788-145-0x0000000180000000-0x0000000180009000-memory.dmp
      Filesize

      36KB

    • memory/4788-142-0x0000000000000000-mapping.dmp
    • memory/4864-133-0x0000000000000000-mapping.dmp
    • memory/4992-136-0x0000000000000000-mapping.dmp
    • memory/4992-141-0x00007FFA06610000-0x00007FFA070D1000-memory.dmp
      Filesize

      10.8MB

    • memory/4992-140-0x000002A94EFC0000-0x000002A94F030000-memory.dmp
      Filesize

      448KB

    • memory/4992-146-0x00007FFA06610000-0x00007FFA070D1000-memory.dmp
      Filesize

      10.8MB

    • memory/4992-139-0x000002A936A30000-0x000002A936A3A000-memory.dmp
      Filesize

      40KB

    • memory/4992-138-0x000002A936A50000-0x000002A936A7E000-memory.dmp
      Filesize

      184KB