Analysis Overview
SHA256
a9e6eed1449e0292385d9033600a3ed8374bad8f8e21a89def72dc46cc9bfd65
Threat Level: Known bad
The file 2024-06-20_4eb9f1ef22f17de86e74df9f39ad06b3_icedid_nymaim was found to be: Known bad.
Malicious Activity Summary
Blackmoon family
Detect Blackmoon payload
UPX dump on OEP (original entry point)
UPX dump on OEP (original entry point)
UPX packed file
Unsigned PE
Suspicious use of SetWindowsHookEx
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2024-06-20 12:03
Signatures
Blackmoon family
Detect Blackmoon payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
UPX dump on OEP (original entry point)
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-20 12:03
Reported
2024-06-20 12:06
Platform
win7-20240611-en
Max time kernel
121s
Max time network
123s
Command Line
Signatures
UPX dump on OEP (original entry point)
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\2024-06-20_4eb9f1ef22f17de86e74df9f39ad06b3_icedid_nymaim.exe | N/A |
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2024-06-20_4eb9f1ef22f17de86e74df9f39ad06b3_icedid_nymaim.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2024-06-20_4eb9f1ef22f17de86e74df9f39ad06b3_icedid_nymaim.exe | N/A |
Suspicious use of SendNotifyMessage
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2024-06-20_4eb9f1ef22f17de86e74df9f39ad06b3_icedid_nymaim.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2024-06-20_4eb9f1ef22f17de86e74df9f39ad06b3_icedid_nymaim.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2024-06-20_4eb9f1ef22f17de86e74df9f39ad06b3_icedid_nymaim.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\2024-06-20_4eb9f1ef22f17de86e74df9f39ad06b3_icedid_nymaim.exe
"C:\Users\Admin\AppData\Local\Temp\2024-06-20_4eb9f1ef22f17de86e74df9f39ad06b3_icedid_nymaim.exe"
Network
| Country | Destination | Domain | Proto |
| CN | 43.241.17.188:45610 | tcp |
Files
memory/2132-0-0x00000000002B0000-0x00000000002BB000-memory.dmp
memory/2132-2-0x00000000002B0000-0x00000000002BB000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-20 12:03
Reported
2024-06-20 12:06
Platform
win10v2004-20240508-en
Max time kernel
51s
Max time network
55s
Command Line
Signatures
UPX dump on OEP (original entry point)
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\2024-06-20_4eb9f1ef22f17de86e74df9f39ad06b3_icedid_nymaim.exe | N/A |
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2024-06-20_4eb9f1ef22f17de86e74df9f39ad06b3_icedid_nymaim.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2024-06-20_4eb9f1ef22f17de86e74df9f39ad06b3_icedid_nymaim.exe | N/A |
Suspicious use of SendNotifyMessage
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2024-06-20_4eb9f1ef22f17de86e74df9f39ad06b3_icedid_nymaim.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2024-06-20_4eb9f1ef22f17de86e74df9f39ad06b3_icedid_nymaim.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2024-06-20_4eb9f1ef22f17de86e74df9f39ad06b3_icedid_nymaim.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\2024-06-20_4eb9f1ef22f17de86e74df9f39ad06b3_icedid_nymaim.exe
"C:\Users\Admin\AppData\Local\Temp\2024-06-20_4eb9f1ef22f17de86e74df9f39ad06b3_icedid_nymaim.exe"
Network
| Country | Destination | Domain | Proto |
| CN | 43.241.17.188:45610 | tcp | |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
Files
memory/2528-0-0x0000000003690000-0x000000000369B000-memory.dmp
memory/2528-2-0x0000000003690000-0x000000000369B000-memory.dmp