Analysis

  • max time kernel
    93s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-05-2024 03:51

General

  • Target

    2024-05-25_7a8ae4294cf2d6f9c2b1f958155e8e0c_icedid.exe

  • Size

    304KB

  • MD5

    7a8ae4294cf2d6f9c2b1f958155e8e0c

  • SHA1

    83ba8c49de4478cd013aebb37e68eb4a61447257

  • SHA256

    c3e189c9e0eccb5c973e6b2e37feebc70e65b6aa7f6e92febe94b7f4ddc01db0

  • SHA512

    bf4f4c3a4f86e241e1deaf23158642d0431f8a1a2f9f1b352608eb37b0b4f73621fb0f178fe635f0c7e2a51f314406692feef6e40361a5ff9d6b7b981ae9cfed

  • SSDEEP

    6144:IrOy6ow9NQnkGNbcncWowjLqY7jU40xgVwi:IrOYnkGGtLqY7jU4xw

Malware Config

Extracted

Family

icedid

Extracted

Family

icedid

Botnet

4031737906

C2

fishofgloster.pw

newwildtuna.top

Attributes
  • auth_var

    3

  • url_path

    /audio/

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • IcedID Second Stage Loader 2 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-25_7a8ae4294cf2d6f9c2b1f958155e8e0c_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-25_7a8ae4294cf2d6f9c2b1f958155e8e0c_icedid.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    PID:2956

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2956-7-0x0000000000630000-0x0000000000633000-memory.dmp
    Filesize

    12KB

  • memory/2956-3-0x00000000007D0000-0x00000000007D6000-memory.dmp
    Filesize

    24KB

  • memory/2956-10-0x0000000000620000-0x0000000000628000-memory.dmp
    Filesize

    32KB