Behavioral task
behavioral1
Sample
2023-08-26_d9f85b042ba88d169e63ac47dc892af4_cobalt-strike_icedid_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-26_d9f85b042ba88d169e63ac47dc892af4_cobalt-strike_icedid_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-26_d9f85b042ba88d169e63ac47dc892af4_cobalt-strike_icedid_JC.exe
-
Size
524KB
-
MD5
d9f85b042ba88d169e63ac47dc892af4
-
SHA1
85bb4a7b4eab0fe23172014ed028554fcf3d4414
-
SHA256
edca2dbcbb6e48040710f77c4ca9c5c33c634e3b26553d98578382003cfcfd42
-
SHA512
444e4dfb799e7be62a84f6c6a35f591d1479e5fbd9b706925a8599d2003c867d9cfb557226cb9db8e2f05363f747a3fbe0dc18a8d263c768643f83ab549088c8
-
SSDEEP
6144:9QA6SUTlqYNvBddImb9C5u1wWxcJQMgMSx5gxUh2q/+KmN/v0ne:d6StYNvBfImb9eTQMgMOZH+Kmh
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2023-08-26_d9f85b042ba88d169e63ac47dc892af4_cobalt-strike_icedid_JC.exe
Files
-
2023-08-26_d9f85b042ba88d169e63ac47dc892af4_cobalt-strike_icedid_JC.exe.exe windows:4 windows x86
7083b3997c50f1fee016075dfefa71e9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
InitializeCriticalSection
EnterCriticalSection
LCMapStringA
FreeLibrary
GetCommandLineA
SetCurrentDirectoryA
GetFileAttributesA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFileSize
RemoveDirectoryA
SetFilePointer
GetTempPathA
GetTickCount
FindFirstFileA
FindNextFileA
GlobalAlloc
GlobalLock
GlobalUnlock
CreateDirectoryA
GetLocalTime
GetEnvironmentVariableA
GetStartupInfoA
CreateFileA
WriteFile
GetModuleFileNameA
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
VirtualFree
GetProcAddress
LoadLibraryA
VirtualAlloc
lstrcpynA
FindClose
FindNextFileW
DeleteFileW
FindFirstFileW
CreateDirectoryW
GetCurrentProcessId
SetLastError
GetNativeSystemInfo
GetExitCodeProcess
ReadFile
PeekNamedPipe
CreateProcessA
CreatePipe
GetCurrentThreadId
DeleteFileA
TerminateThread
GetExitCodeThread
SetWaitableTimer
CreateWaitableTimerA
lstrcpyn
TerminateProcess
Process32NextW
Sleep
Process32FirstW
QueryDosDeviceW
OpenProcess
GetTempPathW
lstrlenW
Module32First
WideCharToMultiByte
Process32Next
Process32First
CreateToolhelp32Snapshot
GetSystemInfo
GetVersionExA
RtlMoveMemory
GetComputerNameA
CloseHandle
GetQueuedCompletionStatus
CreateIoCompletionPort
GetCurrentProcess
LocalFree
LocalAlloc
WaitForSingleObject
CreateThread
MoveFileA
MultiByteToWideChar
DeleteCriticalSection
lstrlenA
SetSystemPowerState
GetLastError
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
TlsAlloc
GlobalFree
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
InterlockedDecrement
WritePrivateProfileStringA
lstrcatA
lstrcpyA
InterlockedIncrement
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetVersion
GetProcessVersion
SetErrorMode
FlushFileBuffers
GetCPInfo
GetOEMCP
RtlUnwind
RaiseException
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
user32
PostQuitMessage
SendMessageA
SetCursor
GetWindowLongA
GetLastActivePopup
SetWindowsHookExA
ValidateRect
CallNextHookEx
GetKeyState
GetNextDlgTabItem
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
GetClassNameA
PtInRect
GetWindowRect
GetDlgCtrlID
GetWindow
SetWindowTextA
UnhookWindowsHookEx
GetMenuItemCount
GetDC
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
SetWindowLongA
SetWindowPos
ShowWindow
SetFocus
GetWindowPlacement
IsIconic
SystemParametersInfoA
ExitWindowsEx
RegisterWindowMessageA
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
UnregisterClassA
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
IsWindowEnabled
GetParent
EnableWindow
GetForegroundWindow
PostMessageA
GetWindowThreadProcessId
GetWindowTextA
IsWindowVisible
MsgWaitForMultipleObjects
GetDesktopWindow
GetWindowTextLengthA
FindWindowExA
SetForegroundWindow
GetActiveWindow
ReleaseDC
GetCursorInfo
GetIconInfo
DrawIcon
ClientToScreen
SetCursorPos
WindowFromPoint
GetCursorPos
GetFocus
GetAncestor
AttachThreadInput
SetActiveWindow
GetSystemMetrics
GetTopWindow
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
GetMessageA
wsprintfA
MessageBoxA
DispatchMessageA
TranslateMessage
PeekMessageA
CallWindowProcA
PostMessageW
KillTimer
SetTimer
MapVirtualKeyA
SendInput
advapi32
GetUserNameA
RegCreateKeyExA
RegOpenKeyExA
RegEnumKeyExA
RegCloseKey
RegEnumValueA
RegQueryValueExA
RegSetValueExA
RegCreateKeyA
RegDeleteKeyA
RegOpenKeyA
RegDeleteValueA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
shell32
SHGetSpecialFolderPathW
ShellExecuteA
ws2_32
send
gethostbyname
setsockopt
WSACleanup
connect
htons
inet_addr
socket
closesocket
recv
WSAStartup
shlwapi
PathIsDirectoryW
PathFileExistsA
psapi
GetProcessImageFileNameW
gdi32
SetTextColor
SetMapMode
SetBkColor
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
RestoreDC
SaveDC
CreateCompatibleDC
CreateDIBSection
DeleteDC
SelectObject
DeleteObject
BitBlt
GdiFlush
GetObjectA
GetStockObject
CreateBitmap
SetViewportOrgEx
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
comctl32
ord17
Sections
.text Size: 308KB - Virtual size: 305KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 172KB - Virtual size: 270KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE