Analysis

  • max time kernel
    232s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    16-10-2023 06:31

General

  • Target

    build-065.msi

  • Size

    988KB

  • MD5

    32ee17c4caae3570e290c8a653aa380f

  • SHA1

    3b6ffb4fe23aa45ab536486f1aa11e02fac520b3

  • SHA256

    86bcd250b70e261d29a20538ffaf9ea3b27b510f02721cc6853bda227deeb118

  • SHA512

    059e383c954f97993bfbef9f161fe8548d52b9814b0f481d245209f9e7388c2a5aeb38b404353279dec892d20f64b96407ce37b46cf0d2362cc78a4b4482d530

  • SSDEEP

    12288:dBlIPDf7JnfcMwbNlquDsGnTFJT+XXW12MJkuTTBZZO2LKHL0vK++KA20n:dBlIGM8ou4GrToG12BoDZoL07+KAD

Malware Config

Extracted

Family

icedid

Campaign

879983162

C2

aptekoagraliy.com

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 15 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 43 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 28 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\build-065.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2352
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2916
    • C:\Windows\system32\MsiExec.exe
      C:\Windows\system32\MsiExec.exe -Embedding 71A5FC12DEAA8E74CFDB8C5C5FF14D0E
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2636
      • C:\Windows\system32\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIDB9.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259460675 1 test.cs!X1X3X2.Y1yY.Z3z1Z
        3⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2612
        • C:\Windows\System32\rundll32.exe
          "C:\Windows\System32\rundll32.exe" "C:\Users\Admin\AppData\Local\MSI81d5ba34.msi",scab /k jeeps329
          4⤵
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          PID:2672
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2044
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003E8" "0000000000000574"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:1136
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Modifies Installed Components in the registry
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2464

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f770041.rbs

    Filesize

    8KB

    MD5

    eb5b6ed4a1e3f9c04735bad495259af0

    SHA1

    9ab3f5d931a19952d358c656a9137c49c7658dec

    SHA256

    305a52d9494c32230fff9a5304b6f5fd99a7b8d3c4b637d9bceef71f76eef2c5

    SHA512

    3adb92909740a015212722cc8482f8ea58114ad70b93ce5cc08d1020ad792e5dcee497ed4744157f88d7395b45f010f63d0f840075a1f48498894ee78661d973

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07298EE8EBA9732300AE62BDCA6B6898

    Filesize

    1KB

    MD5

    e11e31581aae545302f6176a117b4d95

    SHA1

    743af0529bd032a0f44a83cdd4baa97b7c2ec49a

    SHA256

    2e7bf16cc22485a7bbe2aa8696750761b0ae39be3b2fe9d0cc6d4ef73491425c

    SHA512

    c63aba6ca79c60a92b3bd26d784a5436e45a626022958bf6c194afc380c7bfb01fadf0b772513bbdbd7f1bb73691b0edb2f60b2f235ec9e0b81c427e04fbe451

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8555326CC9661C9937DC5053B6C38763

    Filesize

    1KB

    MD5

    866912c070f1ecacacc2d5bca55ba129

    SHA1

    b7ab3308d1ea4477ba1480125a6fbda936490cbb

    SHA256

    85666a562ee0be5ce925c1d8890a6f76a87ec16d4d7d5f29ea7419cf20123b69

    SHA512

    f91e855e0346ac8c3379129154e01488bb22cff7f6a6df2a80f1671e43c5df8acae36fdf5ee0eb2320f287a681a326b6f1df36e8e37aa5597c4797dd6b43b7cf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07298EE8EBA9732300AE62BDCA6B6898

    Filesize

    312B

    MD5

    8edf3de8ba964dfaf10a4a475f6193dd

    SHA1

    eba525d88ce63259117449ea22a85217e74ba63b

    SHA256

    8b8556b36f8d5a0a5c43b5d182e68ae594ec538593c45f4fb3834095d78d05d2

    SHA512

    835bdba208f17657f3ac121edf863599691fe22f6e8ea8c8a10478eddf6613aa208f9cd4e95ada8485204db367c92f565a9fe5526a07646f6b14a6bbbf1677ee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8555326CC9661C9937DC5053B6C38763

    Filesize

    326B

    MD5

    d408a524ffe11796b06bc512833b6d74

    SHA1

    804a2bfa50c297b46a0d8cd6fcc26455a815db36

    SHA256

    679813bbc6c11a4e4eb60f017b06e391f58f17be742ab64be527e048beb39542

    SHA512

    940fa2205932ee045d738f2725fc1ced658e0a59a19959d71d37b54dde9f8157ea8fd005fb7a67c7700a0a9115a29d76d1407a4e684d702b6ce22aeb0558a1e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    49082c5d9bade6ba67d54c356fce7e70

    SHA1

    96307b11acba915956dcb138e934b9d28176fd46

    SHA256

    252b8b4afe43a04f02d5501b7d5a73038cd9418a1449344638bd40f45132db3e

    SHA512

    4f98c8e76fab7609e4a3a9ade8542fa5a3418fc3db05b3a745a986b743489f50b8931c09789c7aa19cdcbf206ed1cb7b2d1913ae8aff101be3f1522d8e52b219

  • C:\Users\Admin\AppData\Local\MSI81d5ba34.msi

    Filesize

    529KB

    MD5

    c00a7a0dc633b124eb26504cc7c89d60

    SHA1

    87e75c6f66d515a53e7a7690f8add5ed3b4e539c

    SHA256

    56828f5666370fd228b33e3f81001d7cdeffdd7643d566bbb01f7a5b29728838

    SHA512

    54add2802c7268c03297640b0440b1f59c867dddec5332e663fce65a3c3624564452187264491c14cdfd81c0aa3367646868cbc791dc168fa84cbb33ea980975

  • C:\Users\Admin\AppData\Local\Temp\Cab7C91.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar7DDC.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • C:\Windows\Installer\MSIDB9.tmp

    Filesize

    408KB

    MD5

    c7e405100714c4c686a256220e59f306

    SHA1

    b67b2c517ecf29b2fbf17a32040d73a1362db884

    SHA256

    471b54fd2b74ce73f41e4fe9ac6c459eba9d8d06c2448fe7097c58e5d8ea04fa

    SHA512

    b7633fd54f60cb41a5a8ecd4b52dad3e767b6babfebb905af7c14f63a8f082b072d8d814defe23b46bdcdfb878b7dd52bd9634b448b59c8b870b69e7bd5a8832

  • \Users\Admin\AppData\Local\MSI81d5ba34.msi

    Filesize

    529KB

    MD5

    c00a7a0dc633b124eb26504cc7c89d60

    SHA1

    87e75c6f66d515a53e7a7690f8add5ed3b4e539c

    SHA256

    56828f5666370fd228b33e3f81001d7cdeffdd7643d566bbb01f7a5b29728838

    SHA512

    54add2802c7268c03297640b0440b1f59c867dddec5332e663fce65a3c3624564452187264491c14cdfd81c0aa3367646868cbc791dc168fa84cbb33ea980975

  • \Windows\Installer\MSIDB9.tmp

    Filesize

    408KB

    MD5

    c7e405100714c4c686a256220e59f306

    SHA1

    b67b2c517ecf29b2fbf17a32040d73a1362db884

    SHA256

    471b54fd2b74ce73f41e4fe9ac6c459eba9d8d06c2448fe7097c58e5d8ea04fa

    SHA512

    b7633fd54f60cb41a5a8ecd4b52dad3e767b6babfebb905af7c14f63a8f082b072d8d814defe23b46bdcdfb878b7dd52bd9634b448b59c8b870b69e7bd5a8832

  • \Windows\Installer\MSIDB9.tmp

    Filesize

    408KB

    MD5

    c7e405100714c4c686a256220e59f306

    SHA1

    b67b2c517ecf29b2fbf17a32040d73a1362db884

    SHA256

    471b54fd2b74ce73f41e4fe9ac6c459eba9d8d06c2448fe7097c58e5d8ea04fa

    SHA512

    b7633fd54f60cb41a5a8ecd4b52dad3e767b6babfebb905af7c14f63a8f082b072d8d814defe23b46bdcdfb878b7dd52bd9634b448b59c8b870b69e7bd5a8832

  • memory/1244-311-0x0000000180000000-0x0000000180009000-memory.dmp

    Filesize

    36KB

  • memory/1244-308-0x0000000077A32000-0x0000000077A33000-memory.dmp

    Filesize

    4KB

  • memory/1244-319-0x00000000029F0000-0x00000000029F1000-memory.dmp

    Filesize

    4KB

  • memory/1244-318-0x0000000180000000-0x0000000180009000-memory.dmp

    Filesize

    36KB

  • memory/2464-335-0x00000000026C0000-0x00000000026D0000-memory.dmp

    Filesize

    64KB

  • memory/2464-321-0x0000000004160000-0x0000000004161000-memory.dmp

    Filesize

    4KB

  • memory/2464-320-0x0000000004160000-0x0000000004161000-memory.dmp

    Filesize

    4KB

  • memory/2612-289-0x0000000001BC0000-0x0000000001BEE000-memory.dmp

    Filesize

    184KB

  • memory/2612-285-0x000007FEF5D40000-0x000007FEF672C000-memory.dmp

    Filesize

    9.9MB

  • memory/2612-304-0x000007FEF5D40000-0x000007FEF672C000-memory.dmp

    Filesize

    9.9MB

  • memory/2612-286-0x000000001A950000-0x000000001A9D0000-memory.dmp

    Filesize

    512KB

  • memory/2612-287-0x000000001A950000-0x000000001A9D0000-memory.dmp

    Filesize

    512KB

  • memory/2612-293-0x0000000001FF0000-0x0000000002060000-memory.dmp

    Filesize

    448KB

  • memory/2612-291-0x0000000001BF0000-0x0000000001BFA000-memory.dmp

    Filesize

    40KB

  • memory/2672-306-0x0000000000190000-0x0000000000194000-memory.dmp

    Filesize

    16KB