Analysis
-
max time kernel
118s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-04-2024 05:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-04-27_fd4dcaa68aad40970bd09cb6bbb6d463_icedid.exe
Resource
win7-20240221-en
windows7-x64
7 signatures
150 seconds
General
-
Target
2024-04-27_fd4dcaa68aad40970bd09cb6bbb6d463_icedid.exe
-
Size
1.3MB
-
MD5
fd4dcaa68aad40970bd09cb6bbb6d463
-
SHA1
528831a95b707ae185d97cf2855e63aa241623fc
-
SHA256
676494941a3d58b29f2c1c99a85ebb1ea01189eef4483c0a231da2c9074c522c
-
SHA512
dfc365186cd1bf6de6239eedaa42e5ef633faa88ea15b9f70711ada66a6aaacd5f33401912ab6797ffe445460298be416cf7469be9a3110403c8ca9a095816a0
-
SSDEEP
12288:WCrO3gDTN14MWUJzlzczyVaYQzoLGi5HwKQDI13gqx8pXyHC:WOOWTr4MZzxczyVyi5QXBW8Mi
Malware Config
Signatures
-
Detect Blackmoon payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1968-0-0x00000000003C0000-0x00000000003EE000-memory.dmp family_blackmoon behavioral1/memory/1968-36-0x00000000003C0000-0x00000000003EE000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1968-1-0x0000000000250000-0x000000000025B000-memory.dmp UPX behavioral1/memory/1968-2-0x0000000000250000-0x000000000025B000-memory.dmp UPX behavioral1/memory/1968-3-0x0000000002160000-0x000000000216B000-memory.dmp UPX behavioral1/memory/1968-5-0x0000000002160000-0x000000000216B000-memory.dmp UPX behavioral1/memory/1968-37-0x0000000000250000-0x000000000025B000-memory.dmp UPX behavioral1/memory/1968-38-0x0000000002160000-0x000000000216B000-memory.dmp UPX -
Processes:
resource yara_rule behavioral1/memory/1968-1-0x0000000000250000-0x000000000025B000-memory.dmp upx behavioral1/memory/1968-2-0x0000000000250000-0x000000000025B000-memory.dmp upx behavioral1/memory/1968-3-0x0000000002160000-0x000000000216B000-memory.dmp upx behavioral1/memory/1968-5-0x0000000002160000-0x000000000216B000-memory.dmp upx behavioral1/memory/1968-37-0x0000000000250000-0x000000000025B000-memory.dmp upx behavioral1/memory/1968-38-0x0000000002160000-0x000000000216B000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
2024-04-27_fd4dcaa68aad40970bd09cb6bbb6d463_icedid.exepid process 1968 2024-04-27_fd4dcaa68aad40970bd09cb6bbb6d463_icedid.exe 1968 2024-04-27_fd4dcaa68aad40970bd09cb6bbb6d463_icedid.exe 1968 2024-04-27_fd4dcaa68aad40970bd09cb6bbb6d463_icedid.exe 1968 2024-04-27_fd4dcaa68aad40970bd09cb6bbb6d463_icedid.exe 1968 2024-04-27_fd4dcaa68aad40970bd09cb6bbb6d463_icedid.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
2024-04-27_fd4dcaa68aad40970bd09cb6bbb6d463_icedid.exedescription pid process Token: SeDebugPrivilege 1968 2024-04-27_fd4dcaa68aad40970bd09cb6bbb6d463_icedid.exe Token: SeDebugPrivilege 1968 2024-04-27_fd4dcaa68aad40970bd09cb6bbb6d463_icedid.exe Token: SeDebugPrivilege 1968 2024-04-27_fd4dcaa68aad40970bd09cb6bbb6d463_icedid.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
2024-04-27_fd4dcaa68aad40970bd09cb6bbb6d463_icedid.exepid process 1968 2024-04-27_fd4dcaa68aad40970bd09cb6bbb6d463_icedid.exe 1968 2024-04-27_fd4dcaa68aad40970bd09cb6bbb6d463_icedid.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-27_fd4dcaa68aad40970bd09cb6bbb6d463_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-27_fd4dcaa68aad40970bd09cb6bbb6d463_icedid.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1968-0-0x00000000003C0000-0x00000000003EE000-memory.dmpFilesize
184KB
-
memory/1968-1-0x0000000000250000-0x000000000025B000-memory.dmpFilesize
44KB
-
memory/1968-2-0x0000000000250000-0x000000000025B000-memory.dmpFilesize
44KB
-
memory/1968-3-0x0000000002160000-0x000000000216B000-memory.dmpFilesize
44KB
-
memory/1968-4-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/1968-6-0x0000000000690000-0x0000000000691000-memory.dmpFilesize
4KB
-
memory/1968-5-0x0000000002160000-0x000000000216B000-memory.dmpFilesize
44KB
-
memory/1968-7-0x0000000000260000-0x0000000000261000-memory.dmpFilesize
4KB
-
memory/1968-8-0x0000000000680000-0x0000000000681000-memory.dmpFilesize
4KB
-
memory/1968-9-0x00000000003F0000-0x00000000003F1000-memory.dmpFilesize
4KB
-
memory/1968-36-0x00000000003C0000-0x00000000003EE000-memory.dmpFilesize
184KB
-
memory/1968-37-0x0000000000250000-0x000000000025B000-memory.dmpFilesize
44KB
-
memory/1968-38-0x0000000002160000-0x000000000216B000-memory.dmpFilesize
44KB