Behavioral task
behavioral1
Sample
2024-04-16_6a03eda9c1b9b6c0267f802e9e2689ea_cobalt-strike_icedid.exe
Resource
win7-20240319-en
General
-
Target
2024-04-16_6a03eda9c1b9b6c0267f802e9e2689ea_cobalt-strike_icedid
-
Size
384KB
-
MD5
6a03eda9c1b9b6c0267f802e9e2689ea
-
SHA1
46cce2049d5ad5d551470a6ba43c2a6a0affd163
-
SHA256
fcfea936dd6281c60f41bd5120c509f5f451870a2e833d5c2a8b30a21eb4664f
-
SHA512
5e947db1b03b77dc606ab4178ca1bdc822749f7ef588fe473481b68a8be9486905bcd191db6a5b085f21f63bbeb43e383e941245f271d764383acea733755053
-
SSDEEP
6144:BHS77lSa7hu1H7ukkcnDtSR6Cgchd34POdOOUqxfzT4Rl:BHwAehMkutSRVhd34PM7T4X
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-16_6a03eda9c1b9b6c0267f802e9e2689ea_cobalt-strike_icedid
Files
-
2024-04-16_6a03eda9c1b9b6c0267f802e9e2689ea_cobalt-strike_icedid.exe windows:4 windows x86 arch:x86
a8dadfdc61dd4ff4c79e9c9e4fbcef28
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersion
SetErrorMode
lstrcpynA
GetCurrentThreadId
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
FlushFileBuffers
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
LocalReAlloc
TlsGetValue
GlobalFlags
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
GetCPInfo
GetOEMCP
RtlUnwind
RaiseException
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
InterlockedExchange
lstrcatA
SetLastError
GlobalAlloc
MultiByteToWideChar
lstrlenA
GetProcessHeap
GetCommandLineA
GetModuleHandleA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
FreeLibrary
MoveFileExA
GetTempFileNameA
GetTempPathA
DeviceIoControl
InitializeCriticalSection
LocalFree
LocalAlloc
OpenProcess
GetCurrentProcess
GetCurrentProcessId
lstrcpyA
TerminateProcess
GetVersionExA
GetLastError
SetFilePointer
CreateToolhelp32Snapshot
GlobalLock
GlobalUnlock
GlobalFree
CreateThread
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
GetTickCount
GetModuleFileNameA
ReadFile
GetFileSize
lstrcpyn
GetProcAddress
LoadLibraryA
Module32First
Process32Next
CloseHandle
Process32First
LCMapStringA
FindFirstFileA
RemoveDirectoryA
FindNextFileA
FindClose
CopyFileA
SetFileAttributesA
CreateDirectoryA
GetLocalTime
GetStartupInfoA
CreateProcessA
WaitForSingleObject
Sleep
WriteFile
MoveFileA
DeleteFileA
GetEnvironmentVariableA
TlsSetValue
CreateFileA
shlwapi
PathFileExistsA
user32
GetDlgCtrlID
SetWindowTextA
GetMenuItemCount
SetWindowPos
SetFocus
GetWindowPlacement
IsIconic
RegisterWindowMessageA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
DestroyMenu
LoadBitmapA
LoadStringA
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetKeyState
CallNextHookEx
SetWindowsHookExA
GetLastActivePopup
IsWindowEnabled
EnableWindow
PostMessageA
PostQuitMessage
GetParent
GetWindow
PtInRect
GetWindowLongA
SetWindowLongA
GetDlgItem
SystemParametersInfoA
GetDC
ReleaseDC
SendMessageA
GetWindowRect
DestroyWindow
UnhookWindowsHookEx
GrayStringA
DrawTextA
TabbedTextOutA
ClientToScreen
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
GetSystemMetrics
wsprintfA
MessageBoxA
CallWindowProcA
GetWindowInfo
GetWindowThreadProcessId
GetClassNameA
GetWindowTextA
IsWindowVisible
EnumWindows
wvsprintfA
GetMenuState
GetMenuCheckMarkDimensions
FindWindowA
gdi32
DeleteDC
SelectObject
GetDeviceCaps
CreateBitmap
SaveDC
SetBkColor
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetObjectA
GetStockObject
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
RestoreDC
DeleteObject
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
advapi32
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextA
ole32
CoInitialize
CoUninitialize
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
comctl32
ord17
Sections
.text Size: 192KB - Virtual size: 188KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 164KB - Virtual size: 288KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 676B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ