Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-04-2024 08:41

General

  • Target

    2024-04-26_c170b8d5a6c3052702737f1ea11b8c42_icedid_xiaobaminer.exe

  • Size

    571KB

  • MD5

    c170b8d5a6c3052702737f1ea11b8c42

  • SHA1

    086e66f55e115d1825b10e71e6036323a7704722

  • SHA256

    1931712ca1601e49391aab44f90eab01891e29c37fffafb5156f63a6a7088a41

  • SHA512

    3acb50c15fe8e3ec4e89ec28de481b72f51089611d15020a93263e0f46cd2c46db922a061c27e46770741a87d0de4909067b405f0338ba7e890e0f4f5aa343b4

  • SSDEEP

    6144:7+4U+1MvyT3UGv9JYm1Z3jccvQVCrnOxfPinOxatBCACc4QvTyaJFvlP1jgT:7+Y+yTSm1Z3jccvQVCrNHtBCACYVj

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 6 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Adds policy Run key to start application 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops autorun.inf file 1 TTPs 6 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-26_c170b8d5a6c3052702737f1ea11b8c42_icedid_xiaobaminer.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-26_c170b8d5a6c3052702737f1ea11b8c42_icedid_xiaobaminer.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Windows\360\360Safe\deepscan\ZhuDongFangYu.exe
      "C:\Windows\360\360Safe\deepscan\ZhuDongFangYu.exe"
      2⤵
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:4724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\360\360Safe\deepscan\ZhuDongFangYu.exe

    Filesize

    571KB

    MD5

    c170b8d5a6c3052702737f1ea11b8c42

    SHA1

    086e66f55e115d1825b10e71e6036323a7704722

    SHA256

    1931712ca1601e49391aab44f90eab01891e29c37fffafb5156f63a6a7088a41

    SHA512

    3acb50c15fe8e3ec4e89ec28de481b72f51089611d15020a93263e0f46cd2c46db922a061c27e46770741a87d0de4909067b405f0338ba7e890e0f4f5aa343b4

  • C:\vcredist2010_x64.log.html

    Filesize

    86KB

    MD5

    b1c03a82c562de66406121a8a8409933

    SHA1

    0d21336508e8a1bbd6c047be52db457664bea184

    SHA256

    04a3aa7957ccaa10fd345503e13f84ffb7bef002622dd8f7b7d45ea7965debae

    SHA512

    3ad200c06106c14f355700140cc7839ea961740231d89fab96db8481d91653223fe37890288a15621f2a467641d28e9b553a3624bb1fa20aaea56c476254e820

  • memory/1712-0-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/1712-1-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/1712-12-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/4724-355-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/4724-495-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB