Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2024 02:01
Behavioral task
behavioral1
Sample
2024-02-01_c32725215c83f22c9dd1c655ea6ebb51_hacktools_icedid.exe
Resource
win7-20231129-en
General
-
Target
2024-02-01_c32725215c83f22c9dd1c655ea6ebb51_hacktools_icedid.exe
-
Size
4.7MB
-
MD5
c32725215c83f22c9dd1c655ea6ebb51
-
SHA1
c87bf2c2dc96cf63d454d09c357af3beab15be39
-
SHA256
c338a1c285f348d9d8c1a1bb4ec38e82d11ca513b97dfd825c2bfb9c598311fe
-
SHA512
4ff5cd43234a7c7afbeaf1750ef1ce359ca787b97cb157e07d429655db13dd5cff6e2d2fd1397b16efe5f9ccb0e57fba7053268fb5cfcb58ff6200f5f86e95b6
-
SSDEEP
98304:DwN9V/TKWfxlcswUr+cIJA0QTJfT+E5/uP:C9V/TZlv/+cP0QTtyLP
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral2/files/0x000800000002323a-4.dat family_blackmoon -
UPX dump on OEP (original entry point) 5 IoCs
resource yara_rule behavioral2/files/0x000800000002323a-4.dat UPX behavioral2/files/0x00020000000228cb-15.dat UPX behavioral2/files/0x00020000000228cb-16.dat UPX behavioral2/memory/2716-18-0x0000000010000000-0x000000001028D000-memory.dmp UPX behavioral2/memory/2716-3893-0x0000000010000000-0x000000001028D000-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 2716 TPHelper.exe -
Loads dropped DLL 1 IoCs
pid Process 2716 TPHelper.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1096 2716 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1096 2024-02-01_c32725215c83f22c9dd1c655ea6ebb51_hacktools_icedid.exe 1096 2024-02-01_c32725215c83f22c9dd1c655ea6ebb51_hacktools_icedid.exe 1096 2024-02-01_c32725215c83f22c9dd1c655ea6ebb51_hacktools_icedid.exe 1096 2024-02-01_c32725215c83f22c9dd1c655ea6ebb51_hacktools_icedid.exe 1096 2024-02-01_c32725215c83f22c9dd1c655ea6ebb51_hacktools_icedid.exe 1096 2024-02-01_c32725215c83f22c9dd1c655ea6ebb51_hacktools_icedid.exe 1096 2024-02-01_c32725215c83f22c9dd1c655ea6ebb51_hacktools_icedid.exe 1096 2024-02-01_c32725215c83f22c9dd1c655ea6ebb51_hacktools_icedid.exe 1096 2024-02-01_c32725215c83f22c9dd1c655ea6ebb51_hacktools_icedid.exe 1096 2024-02-01_c32725215c83f22c9dd1c655ea6ebb51_hacktools_icedid.exe 1096 2024-02-01_c32725215c83f22c9dd1c655ea6ebb51_hacktools_icedid.exe 1096 2024-02-01_c32725215c83f22c9dd1c655ea6ebb51_hacktools_icedid.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1096 2024-02-01_c32725215c83f22c9dd1c655ea6ebb51_hacktools_icedid.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1096 2024-02-01_c32725215c83f22c9dd1c655ea6ebb51_hacktools_icedid.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1096 wrote to memory of 2716 1096 2024-02-01_c32725215c83f22c9dd1c655ea6ebb51_hacktools_icedid.exe 89 PID 1096 wrote to memory of 2716 1096 2024-02-01_c32725215c83f22c9dd1c655ea6ebb51_hacktools_icedid.exe 89 PID 1096 wrote to memory of 2716 1096 2024-02-01_c32725215c83f22c9dd1c655ea6ebb51_hacktools_icedid.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-01_c32725215c83f22c9dd1c655ea6ebb51_hacktools_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-01_c32725215c83f22c9dd1c655ea6ebb51_hacktools_icedid.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\TPHelper.exeC:\Users\Admin\AppData\Local\Temp\\TPHelper.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2716 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2716 -s 5323⤵
- Program crash
PID:1096
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2716 -ip 27161⤵PID:936
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5845e6e5cc4c298dc6ac7b81de8941b8c
SHA1b7ad5204d2f9f098a5640354258e878755a1b9d1
SHA2562fd9dbfdc24a692ee247432989a4d35b87d2d2bab71f465b72e0ce45ffa772af
SHA5120e54e3ebd68d165b423ee23dfb0211990277eccc8d2a2ff93ceb2e17735a5363887e51e1e0b52e04de3783d2ca36e49443b55eb223c8b7ab3a09979b25eb7487
-
Filesize
640KB
MD5358dfe13522a65905fe409ef09f07bbb
SHA10e0fa46d4b5f9efab372c2f05b4c994e6c597157
SHA256d2a62c6d096dcc245240e6c490b32d9139ecc5487f0a88dcf63bd4091e518272
SHA512e2464785b7f3847cce555d9afb1364ee14338b791c9dcaba84336dfe5250b07b5ebccafcc220caf4f6b0a9cc9e8acec3847106b1be4ab2525fad36b0ac6c0089
-
Filesize
534KB
MD531ab8e9182f5f4a5b142a5b0837da1c9
SHA1b95f5c61cd8f0d77e88ea59f6eb4b33ea9b85533
SHA25651d6833c07512859e6c8590bcc28bc3bc2f9fc1fe79b313e52ff6df4972d24b3
SHA5129c255c79c62018aa3e2530d08bdd974be0637cfd08e6ba661f85f6f5759318c7cdf907a8da9d53093ba69ede6d94d232c8450aef06d845e60f906f44f63ba762
-
Filesize
529KB
MD59aa535082284692e911f205c938bfd4a
SHA1731c98e4496442c8af7e84be1054235953ca88f8
SHA256a1b28c2b9dc12eb7b5a623ac9b8dfe3fc587968fea5f95c46839d258131185f0
SHA5126554a457adafd5392066ee99cfd92cce20f52ddf2213a8c319e36ee03bef95972f9b117a371d2ca5672911051f72746a8872e816b9e96bddf9288c104139bbbb
-
Filesize
611KB
MD5afdb405fcf7ebf5852f15343da85e673
SHA1a0ca7e7bfdc775fef1664fbfec566c63fbe88ba7
SHA25605ea51eb1fdf21de2ef4f3bda1f1152c6d1970709d43e1d721403bdd57a03468
SHA512f7381b0e2fe36a7c5ec646475098d325604750037a21da4fe0c99b7f9c755a8185e4278ff333fe3961e7c28109468055ddb5f3793558c1230aa69fc5a37e7f0d