Analysis

  • max time kernel
    153s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/09/2023, 19:12

General

  • Target

    2023-08-22_6d66c2f646c490eed43f144c59062fbb_hacktools_icedid_JC.exe

  • Size

    10.7MB

  • MD5

    6d66c2f646c490eed43f144c59062fbb

  • SHA1

    14af64701a30ccf3dfc9a2e8c8dc73d8deba407c

  • SHA256

    9d436fe5f29d71ed3bbaa7d0fa97826bf21d2da268e06621b67925b8cdd932b2

  • SHA512

    5bcadec44d8564167684c42e4befba6bb4bb490c43f4375bedbaa0278619dd796482e57cde2bb91fc2be80dc23efb40ae04bd43a3ad8b2e861eb092df592a23f

  • SSDEEP

    196608:kasvJCtKDEPwSiLKXSROh8PEb/SiLKXSRq:XsvJyKDEoSiLKXSRO+PErSiLKXSRq

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 11 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2023-08-22_6d66c2f646c490eed43f144c59062fbb_hacktools_icedid_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\2023-08-22_6d66c2f646c490eed43f144c59062fbb_hacktools_icedid_JC.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4888
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://moyu.gdzayx.com/
      2⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3864
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff094646f8,0x7fff09464708,0x7fff09464718
        3⤵
          PID:1116
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,12302313422635177657,11563697220413992337,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:3
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3440
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,12302313422635177657,11563697220413992337,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:2
          3⤵
            PID:4884
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,12302313422635177657,11563697220413992337,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2936 /prefetch:8
            3⤵
              PID:3048
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12302313422635177657,11563697220413992337,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3564 /prefetch:1
              3⤵
                PID:2448
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12302313422635177657,11563697220413992337,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3544 /prefetch:1
                3⤵
                  PID:1940
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,12302313422635177657,11563697220413992337,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:8
                  3⤵
                    PID:3300
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,12302313422635177657,11563697220413992337,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:8
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4160
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12302313422635177657,11563697220413992337,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:1
                    3⤵
                      PID:3872
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12302313422635177657,11563697220413992337,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:1
                      3⤵
                        PID:1600
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12302313422635177657,11563697220413992337,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4016 /prefetch:1
                        3⤵
                          PID:4932
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12302313422635177657,11563697220413992337,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3796 /prefetch:1
                          3⤵
                            PID:3924
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,12302313422635177657,11563697220413992337,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2328 /prefetch:2
                            3⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:4948
                      • C:\Windows\System32\CompPkgSrv.exe
                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                        1⤵
                          PID:1716
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:4776

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                            Filesize

                            152B

                            MD5

                            29e414757ec5f96753331ee050189d4e

                            SHA1

                            1e77a6b0e6d4a9236ff7bf4d70cd5bc3552716dd

                            SHA256

                            ad7db569f6f5cd84623a76c82eb816e86b4cf01753f353a5746a4907fff326cf

                            SHA512

                            4be7a1fdf2440637d9230c389d475af184e6f5599f0bb5547fce31f3a23a1c439746d433402243574a83f25ad9b8e4e1152578a37bdfce80a840baf7a2d68ea5

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                            Filesize

                            96B

                            MD5

                            001ffdddcbaa2c5cec134c9d77234992

                            SHA1

                            960d6e7820a4cd4ed6e2829d1d2e09629ecef1c6

                            SHA256

                            fb701898f443d4d21b12892235e8837523af28dea07b58cf3248abfd6ea54f9c

                            SHA512

                            03b07267b471282bc11cc51d32fc7b9c467bd6cee5b6577cf33c835eb0352d3fd51e9623f325ac4809d6ee36c3aef97c9ab7b3ada19585cd5afb08428577bb02

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                            Filesize

                            111B

                            MD5

                            285252a2f6327d41eab203dc2f402c67

                            SHA1

                            acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                            SHA256

                            5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                            SHA512

                            11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                            Filesize

                            5KB

                            MD5

                            10df2eed7961f2a8a5c36e1d1bba1009

                            SHA1

                            32567c37cac19eae81d1a1fd288cb3c831ecec24

                            SHA256

                            93b2354b7fdedaf5e3b01dda6a69cc9977478cadf87c00f41efb23a20b1a3848

                            SHA512

                            d27505f61b76d8393c702d054edac480f8c419523659b3f0c3348a895f01a224016ac9fcf2bd03a60ec8d7832a690475a73454ae049cfac66ac6d42509b8ef46

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                            Filesize

                            5KB

                            MD5

                            cce2630a891224fde94b144e4a9b67e1

                            SHA1

                            9f299b15c9a5d7c1d67b1b28da4ae05bc2f3d38b

                            SHA256

                            72ab9f0fccb42b3fffc0cce12027dfa69c0d25ccd8391a5360c4fda97de77057

                            SHA512

                            55dd88e2322222f155f03ab8ecbb394a4fe22637b3f882f5032fd391a68b0244cd00f23aef4126582f59791dfeadce30002fd86d02a1cacf33197c5fad6a518b

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                            Filesize

                            16B

                            MD5

                            6752a1d65b201c13b62ea44016eb221f

                            SHA1

                            58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                            SHA256

                            0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                            SHA512

                            9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                            Filesize

                            4KB

                            MD5

                            0de22d7c993d0fd9b0762316c5d40d7c

                            SHA1

                            96716ecf52f30805be2f1d2aa89c2587dd30bf60

                            SHA256

                            037f76756d72f1d63dbc5fc8f7ec01ee357c591797417b5eef52bb0f42d8197b

                            SHA512

                            7e6dcad0b604780d5c2e9b40b386ccf0001bede0ce2fedcd7736272e5a6f286bb090198d942e5cbe30c2cd0a440003c9976de5959860b8090fd083034615d19b

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                            Filesize

                            4KB

                            MD5

                            98f666ba7ee2aba1979d09a5070e4d44

                            SHA1

                            fad3ca04a62cb61c78215b161f1af68361ae856d

                            SHA256

                            780eea5621e8c520d432aa0d781f2478647240b2cc84edb63bacfb8578837ba7

                            SHA512

                            e0e10d0f2ebd441f7f0037df26730a5c208fe2b471a42836e76cddc6a6583e07194264e599316f01375d0a272846a8a3b59fbcd17bdb3584c03dc071428a5dcd

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                            Filesize

                            4KB

                            MD5

                            f7c58046ca90fa4ff7a56531d456e365

                            SHA1

                            71ecec45c25de56ae0cfb1e5c0980843a0415037

                            SHA256

                            49b589799ffb3ffaf639a914ab24f633aca35f7d5ff242d12bcabe2b88090cbf

                            SHA512

                            b517986903f9f04ca76d8c83f97e5bc090a74ef590518cb8e6bf2f1fa7873d767ffe7b0dc610d298dd1ea0982d5668622126d425ea1fa7f944c0f17c4934d952

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                            Filesize

                            5KB

                            MD5

                            b5cdafae312395351c95d1416f793d5d

                            SHA1

                            c8ab37136fb737a41ec11271bb80b6437fa19b4c

                            SHA256

                            24727b02a245bac30bd11e3383fc7314fedb764fa4f83a3fb26ac4e5d4513cf0

                            SHA512

                            a0f9da7c7314a8d061968ba879f88250fe3f79fd18a7d5d4799600a41b4d5f6153efc2e9353067e0ff03d1ee1807a014e341e284002eb974b11ff41e6fe13c48

                          • memory/4888-5-0x0000000000400000-0x0000000000F03000-memory.dmp

                            Filesize

                            11.0MB

                          • memory/4888-0-0x0000000010000000-0x0000000010019000-memory.dmp

                            Filesize

                            100KB

                          • memory/4888-37-0x0000000000400000-0x0000000000F03000-memory.dmp

                            Filesize

                            11.0MB

                          • memory/4888-6-0x0000000000400000-0x0000000000F03000-memory.dmp

                            Filesize

                            11.0MB

                          • memory/4888-32-0x0000000000400000-0x0000000000F03000-memory.dmp

                            Filesize

                            11.0MB

                          • memory/4888-100-0x0000000010000000-0x0000000010019000-memory.dmp

                            Filesize

                            100KB

                          • memory/4888-101-0x0000000000400000-0x0000000000F03000-memory.dmp

                            Filesize

                            11.0MB

                          • memory/4888-29-0x0000000000400000-0x0000000000F03000-memory.dmp

                            Filesize

                            11.0MB

                          • memory/4888-4-0x0000000000400000-0x0000000000F03000-memory.dmp

                            Filesize

                            11.0MB

                          • memory/4888-3-0x0000000000400000-0x0000000000F03000-memory.dmp

                            Filesize

                            11.0MB

                          • memory/4888-1-0x0000000010000000-0x0000000010019000-memory.dmp

                            Filesize

                            100KB

                          • memory/4888-35-0x0000000000400000-0x0000000000F03000-memory.dmp

                            Filesize

                            11.0MB

                          • memory/4888-34-0x0000000000400000-0x0000000000F03000-memory.dmp

                            Filesize

                            11.0MB

                          • memory/4888-33-0x0000000000400000-0x0000000000F03000-memory.dmp

                            Filesize

                            11.0MB