Analysis

  • max time kernel
    119s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 01:53

General

  • Target

    2023-08-26_2531d96393695a4a2c1258f0c0d9f4c3_icedid_JC.exe

  • Size

    437KB

  • MD5

    2531d96393695a4a2c1258f0c0d9f4c3

  • SHA1

    8539e32dd4fee240471a189372aa1420ce7c67dc

  • SHA256

    9ab36e49c71327684708541a2664ffdd1bdf5ceba5600e3b3b0c0169342f8158

  • SHA512

    8fc51efc3ee6c9287540d666c86a7f82c8fc564714f17fdea3a98c5aa0f9162c3338e918f99a45f8b83bff55b77a0d925977524f96bc6b2eff5753cdea939a71

  • SSDEEP

    6144:NsYQXsnUVx4ZXvQShdciXvbGLcqBG65tufv1Qp9A2+94juR1y93kxhLAdWWX4Kx0:NjndvQSrLXvbGIqBGr1m+917L79Kx0

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Signatures

  • Modifies firewall policy service 2 TTPs 3 IoCs
  • Sality

    Sality is backdoor written in C++, first discovered in 2003.

  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 6 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 7 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2023-08-26_2531d96393695a4a2c1258f0c0d9f4c3_icedid_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\2023-08-26_2531d96393695a4a2c1258f0c0d9f4c3_icedid_JC.exe"
    1⤵
    • Modifies firewall policy service
    • UAC bypass
    • Windows security bypass
    • Windows security modification
    • Checks whether UAC is enabled
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • System policy modification
    PID:3048

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3048-0-0x0000000000400000-0x0000000000472000-memory.dmp

          Filesize

          456KB

        • memory/3048-1-0x0000000001F70000-0x000000000302A000-memory.dmp

          Filesize

          16.7MB

        • memory/3048-3-0x0000000001F70000-0x000000000302A000-memory.dmp

          Filesize

          16.7MB

        • memory/3048-6-0x0000000000400000-0x0000000000472000-memory.dmp

          Filesize

          456KB