Analysis
-
max time kernel
119s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 01:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-06_0fe9a8297f63bc76da89b5b3c7fb228e_icedid.exe
Resource
win7-20240221-en
General
-
Target
2024-07-06_0fe9a8297f63bc76da89b5b3c7fb228e_icedid.exe
-
Size
956KB
-
MD5
0fe9a8297f63bc76da89b5b3c7fb228e
-
SHA1
0eab8773591fdac7ecade3a4f52755d794e8db56
-
SHA256
b8facee9269812621dc5fded0ce2cec292220ed3ffa114d2420863051d7f9488
-
SHA512
94f45793f6d9239561efeb6dbb832f59c911e6f1f5becdcaf770042677104ef045edf8be473db87c018c3e1f448ce5c89cfbb7cbe9be8ae73fca5419f363a7a5
-
SSDEEP
12288:7mJIkZqyOW6GHbBm0TezQjiFOnnXPA8JLp8jDmrgR42Uf+nFV1XE:7mikUyR6ebw06z4o8Jwm+E+nT
Malware Config
Signatures
-
Detect Blackmoon payload 3 IoCs
resource yara_rule behavioral1/memory/2248-1-0x00000000003D0000-0x00000000003FF000-memory.dmp family_blackmoon behavioral1/memory/2248-7-0x00000000003D0000-0x00000000003FF000-memory.dmp family_blackmoon behavioral1/memory/2416-8-0x0000000000310000-0x000000000033F000-memory.dmp family_blackmoon -
Deletes itself 1 IoCs
pid Process 1584 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2416 YuuomXQ.exe 2692 YuuomXQ.exe -
Loads dropped DLL 2 IoCs
pid Process 2248 2024-07-06_0fe9a8297f63bc76da89b5b3c7fb228e_icedid.exe 2416 YuuomXQ.exe -
resource yara_rule behavioral1/memory/2692-12-0x00000000002E0000-0x00000000002EB000-memory.dmp upx behavioral1/memory/2692-13-0x00000000002F0000-0x00000000002FB000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2188 PING.EXE -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2248 2024-07-06_0fe9a8297f63bc76da89b5b3c7fb228e_icedid.exe 2248 2024-07-06_0fe9a8297f63bc76da89b5b3c7fb228e_icedid.exe 2248 2024-07-06_0fe9a8297f63bc76da89b5b3c7fb228e_icedid.exe 2248 2024-07-06_0fe9a8297f63bc76da89b5b3c7fb228e_icedid.exe 2248 2024-07-06_0fe9a8297f63bc76da89b5b3c7fb228e_icedid.exe 2248 2024-07-06_0fe9a8297f63bc76da89b5b3c7fb228e_icedid.exe 2416 YuuomXQ.exe 2416 YuuomXQ.exe 2416 YuuomXQ.exe 2416 YuuomXQ.exe 2416 YuuomXQ.exe 2416 YuuomXQ.exe 2692 YuuomXQ.exe 2692 YuuomXQ.exe 2692 YuuomXQ.exe 2692 YuuomXQ.exe 2692 YuuomXQ.exe 2692 YuuomXQ.exe 2692 YuuomXQ.exe 2692 YuuomXQ.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2248 2024-07-06_0fe9a8297f63bc76da89b5b3c7fb228e_icedid.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2692 YuuomXQ.exe Token: SeDebugPrivilege 2692 YuuomXQ.exe Token: SeDebugPrivilege 2692 YuuomXQ.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2248 2024-07-06_0fe9a8297f63bc76da89b5b3c7fb228e_icedid.exe 2248 2024-07-06_0fe9a8297f63bc76da89b5b3c7fb228e_icedid.exe 2416 YuuomXQ.exe 2416 YuuomXQ.exe 2692 YuuomXQ.exe 2692 YuuomXQ.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2416 2248 2024-07-06_0fe9a8297f63bc76da89b5b3c7fb228e_icedid.exe 28 PID 2248 wrote to memory of 2416 2248 2024-07-06_0fe9a8297f63bc76da89b5b3c7fb228e_icedid.exe 28 PID 2248 wrote to memory of 2416 2248 2024-07-06_0fe9a8297f63bc76da89b5b3c7fb228e_icedid.exe 28 PID 2248 wrote to memory of 2416 2248 2024-07-06_0fe9a8297f63bc76da89b5b3c7fb228e_icedid.exe 28 PID 2248 wrote to memory of 1584 2248 2024-07-06_0fe9a8297f63bc76da89b5b3c7fb228e_icedid.exe 29 PID 2248 wrote to memory of 1584 2248 2024-07-06_0fe9a8297f63bc76da89b5b3c7fb228e_icedid.exe 29 PID 2248 wrote to memory of 1584 2248 2024-07-06_0fe9a8297f63bc76da89b5b3c7fb228e_icedid.exe 29 PID 2248 wrote to memory of 1584 2248 2024-07-06_0fe9a8297f63bc76da89b5b3c7fb228e_icedid.exe 29 PID 1584 wrote to memory of 2188 1584 cmd.exe 31 PID 1584 wrote to memory of 2188 1584 cmd.exe 31 PID 1584 wrote to memory of 2188 1584 cmd.exe 31 PID 1584 wrote to memory of 2188 1584 cmd.exe 31 PID 2416 wrote to memory of 2692 2416 YuuomXQ.exe 32 PID 2416 wrote to memory of 2692 2416 YuuomXQ.exe 32 PID 2416 wrote to memory of 2692 2416 YuuomXQ.exe 32 PID 2416 wrote to memory of 2692 2416 YuuomXQ.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_0fe9a8297f63bc76da89b5b3c7fb228e_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-06_0fe9a8297f63bc76da89b5b3c7fb228e_icedid.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Public\Downloads\YuuomXQ.exeUXQbbBfyXDAvnBnJwaPbFUcW2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Public\Downloads\YuuomXQ.exemmzRQZIq3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2692
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" cmd/c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\[email protected] > nul && exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.13⤵
- Runs ping.exe
PID:2188
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
956KB
MD50fe9a8297f63bc76da89b5b3c7fb228e
SHA10eab8773591fdac7ecade3a4f52755d794e8db56
SHA256b8facee9269812621dc5fded0ce2cec292220ed3ffa114d2420863051d7f9488
SHA51294f45793f6d9239561efeb6dbb832f59c911e6f1f5becdcaf770042677104ef045edf8be473db87c018c3e1f448ce5c89cfbb7cbe9be8ae73fca5419f363a7a5