Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    08/08/2023, 17:21

General

  • Target

    9c9f56f51cd849caa142f0c014bd4080_icedid_lightbolt_JC.exe

  • Size

    18.5MB

  • MD5

    9c9f56f51cd849caa142f0c014bd4080

  • SHA1

    d24a31dbbe08dca5e9353592d1ecaae35b668435

  • SHA256

    1a71e8811d5d5b4dfc137e1c9a5bf6c4acac1fff675746be8d45e819a4491d0e

  • SHA512

    733e9e935f91b7ebbe509681909c0ba6fe2e9d2af731626512a6e248fcb496cd9b6a649c248026d74fd5d8e766e699aec61748e2a6ee908007a87cfbfd091330

  • SSDEEP

    196608:wjWEjWWs3TehREvuI+kL2t0La3ZKat01NHqDXJqNjEe4pc3+rk5q55:ycT7vMkL27re1NHqbJYPDq55

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9c9f56f51cd849caa142f0c014bd4080_icedid_lightbolt_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\9c9f56f51cd849caa142f0c014bd4080_icedid_lightbolt_JC.exe"
    1⤵
    • Drops file in Drivers directory
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2196

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\Uninstall.exe

    Filesize

    18.5MB

    MD5

    aac45583c14fe3dbef136f239e07472b

    SHA1

    623e73397fe2ae2cdd9e0c32ed4f65152e1c7c07

    SHA256

    3738af2ca6c45725ca1ac588052977f28fc7e96177731acbd0c865986dbfe345

    SHA512

    e9a24d410614b4dc44f093f9227bd65e1892806895ef1e91e08bd3f9e6fa1fdad284cbd51d4ba4d43ddfa3f0874a856ec8fc288e27f3a52b24e091f948dbb9d1