Malware Analysis Report

2025-01-03 06:01

Sample ID 240409-zjlr4sag53
Target 2024-04-09_81cc644e011ca27f60a642a3bbe13658_icedid
SHA256 668ece05dba24ea2a9df00d3699b1bca44f9ac3c4d0302cd06c7f84985d37f78
Tags
emotet epoch3 banker trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

668ece05dba24ea2a9df00d3699b1bca44f9ac3c4d0302cd06c7f84985d37f78

Threat Level: Known bad

The file 2024-04-09_81cc644e011ca27f60a642a3bbe13658_icedid was found to be: Known bad.

Malicious Activity Summary

emotet epoch3 banker trojan

Emotet

Emotet payload

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-04-09 20:44

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-09 20:44

Reported

2024-04-09 20:49

Platform

win7-20240221-en

Max time kernel

130s

Max time network

143s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2024-04-09_81cc644e011ca27f60a642a3bbe13658_icedid.exe"

Signatures

Emotet

trojan banker emotet

Emotet payload

trojan banker
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-09_81cc644e011ca27f60a642a3bbe13658_icedid.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\2024-04-09_81cc644e011ca27f60a642a3bbe13658_icedid.exe

"C:\Users\Admin\AppData\Local\Temp\2024-04-09_81cc644e011ca27f60a642a3bbe13658_icedid.exe"

Network

Country Destination Domain Proto
TR 78.189.60.109:443 tcp
TR 78.189.60.109:443 tcp
US 198.57.203.63:8080 tcp
US 198.57.203.63:8080 tcp
FR 163.172.107.70:8080 tcp
FR 163.172.107.70:8080 tcp

Files

memory/2148-2-0x0000000000580000-0x0000000000680000-memory.dmp

memory/2148-1-0x0000000000220000-0x000000000022C000-memory.dmp

memory/2148-6-0x0000000000220000-0x000000000022C000-memory.dmp

memory/2148-7-0x0000000000580000-0x0000000000680000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-09 20:44

Reported

2024-04-09 20:50

Platform

win10v2004-20240319-en

Max time kernel

175s

Max time network

212s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2024-04-09_81cc644e011ca27f60a642a3bbe13658_icedid.exe"

Signatures

Emotet

trojan banker emotet

Emotet payload

trojan banker
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-04-09_81cc644e011ca27f60a642a3bbe13658_icedid.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\2024-04-09_81cc644e011ca27f60a642a3bbe13658_icedid.exe

"C:\Users\Admin\AppData\Local\Temp\2024-04-09_81cc644e011ca27f60a642a3bbe13658_icedid.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3760 --field-trial-handle=2264,i,1475924722205134884,16549311107360026087,262144 --variations-seed-version /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 69.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 0.205.248.87.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 130.118.77.104.in-addr.arpa udp
US 8.8.8.8:53 21.114.53.23.in-addr.arpa udp
US 8.8.8.8:53 205.47.74.20.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
TR 78.189.60.109:443 tcp
US 8.8.8.8:53 31.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 198.57.203.63:8080 tcp
US 8.8.8.8:53 99.58.20.217.in-addr.arpa udp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
FR 163.172.107.70:8080 tcp
US 8.8.8.8:53 11.173.189.20.in-addr.arpa udp
ID 203.153.216.178:7080 tcp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
FR 51.38.201.19:7080 tcp

Files

memory/1996-1-0x0000000000630000-0x000000000063C000-memory.dmp

memory/1996-5-0x0000000000690000-0x0000000000790000-memory.dmp

memory/1996-6-0x0000000000630000-0x000000000063C000-memory.dmp

memory/1996-7-0x0000000000690000-0x0000000000790000-memory.dmp