Analysis
-
max time kernel
143s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 00:34
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-27_f5ea12474b1461fec0a6a88a3831062f_icedid_sakula.exe
Resource
win7-20240704-en
General
-
Target
2024-07-27_f5ea12474b1461fec0a6a88a3831062f_icedid_sakula.exe
-
Size
22.7MB
-
MD5
f5ea12474b1461fec0a6a88a3831062f
-
SHA1
cfab2004544d5bbbd97123ac51f49a998cd61df4
-
SHA256
a8a3270b145e813fae09d59b0526235d37148eb53e2b44068c71cd4d28786f96
-
SHA512
2febd7b296488efdc83ccbe6a4a288f131e13842677d5f41c81a9546671e909c5e965a1c1742687ea7d7e924c04c9137797532ec8273b0dc5b88e61a7ff85528
-
SSDEEP
196608:ZEYpB1oNKPLCuSJlCuA5GLAlyFzG/ArV/fT/Tn82QDZE7N/Y:qQyNKPLCuS3CD/k1T7B7y
Malware Config
Signatures
-
Detect Blackmoon payload 13 IoCs
resource yara_rule behavioral2/files/0x00090000000234a9-8.dat family_blackmoon behavioral2/memory/916-24-0x0000000000770000-0x000000000092B000-memory.dmp family_blackmoon behavioral2/memory/916-29-0x0000000000770000-0x000000000092B000-memory.dmp family_blackmoon behavioral2/memory/916-28-0x0000000000770000-0x000000000092B000-memory.dmp family_blackmoon behavioral2/memory/916-27-0x0000000000770000-0x000000000092B000-memory.dmp family_blackmoon behavioral2/memory/916-30-0x0000000000770000-0x000000000092B000-memory.dmp family_blackmoon behavioral2/memory/916-31-0x0000000000770000-0x000000000092B000-memory.dmp family_blackmoon behavioral2/memory/916-23-0x0000000000770000-0x000000000092B000-memory.dmp family_blackmoon behavioral2/memory/916-33-0x0000000000770000-0x000000000092B000-memory.dmp family_blackmoon behavioral2/memory/916-21-0x0000000000770000-0x000000000092B000-memory.dmp family_blackmoon behavioral2/memory/916-34-0x0000000000770000-0x000000000092B000-memory.dmp family_blackmoon behavioral2/memory/916-35-0x0000000000770000-0x000000000092B000-memory.dmp family_blackmoon behavioral2/memory/916-41-0x0000000000770000-0x000000000092B000-memory.dmp family_blackmoon -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation 2024-07-27_f5ea12474b1461fec0a6a88a3831062f_icedid_sakula.exe -
Deletes itself 1 IoCs
pid Process 916 Tomcat.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WPS.lnk Tomcat.exe -
Executes dropped EXE 1 IoCs
pid Process 916 Tomcat.exe -
resource yara_rule behavioral2/memory/2752-2-0x0000000010000000-0x0000000010014000-memory.dmp upx behavioral2/memory/2752-3-0x0000000010000000-0x0000000010014000-memory.dmp upx behavioral2/memory/916-22-0x0000000001440000-0x0000000001458000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-07-27_f5ea12474b1461fec0a6a88a3831062f_icedid_sakula.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tomcat.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2752 2024-07-27_f5ea12474b1461fec0a6a88a3831062f_icedid_sakula.exe 2752 2024-07-27_f5ea12474b1461fec0a6a88a3831062f_icedid_sakula.exe 2752 2024-07-27_f5ea12474b1461fec0a6a88a3831062f_icedid_sakula.exe 2752 2024-07-27_f5ea12474b1461fec0a6a88a3831062f_icedid_sakula.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe 916 Tomcat.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 916 Tomcat.exe Token: SeLockMemoryPrivilege 916 Tomcat.exe Token: SeCreateGlobalPrivilege 916 Tomcat.exe Token: SeBackupPrivilege 916 Tomcat.exe Token: SeRestorePrivilege 916 Tomcat.exe Token: SeShutdownPrivilege 916 Tomcat.exe Token: SeCreateTokenPrivilege 916 Tomcat.exe Token: SeTakeOwnershipPrivilege 916 Tomcat.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2752 2024-07-27_f5ea12474b1461fec0a6a88a3831062f_icedid_sakula.exe 2752 2024-07-27_f5ea12474b1461fec0a6a88a3831062f_icedid_sakula.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2752 wrote to memory of 916 2752 2024-07-27_f5ea12474b1461fec0a6a88a3831062f_icedid_sakula.exe 87 PID 2752 wrote to memory of 916 2752 2024-07-27_f5ea12474b1461fec0a6a88a3831062f_icedid_sakula.exe 87 PID 2752 wrote to memory of 916 2752 2024-07-27_f5ea12474b1461fec0a6a88a3831062f_icedid_sakula.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-27_f5ea12474b1461fec0a6a88a3831062f_icedid_sakula.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-27_f5ea12474b1461fec0a6a88a3831062f_icedid_sakula.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\Documents\Tomcat.exe"C:\Users\Admin\Documents\Tomcat.exe"2⤵
- Deletes itself
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5d6e6d04854f4453e988f8bc095e47ef4
SHA14bd700e4eb85a370b3c294cd2cc4ad97f04c138d
SHA256dfa45f10e99685ac308504d54be2e13301aeee1a74d36c6c67a5053068459670
SHA512db679a7d3dede62e70a4880c547f097e2906e2d1025f5843c6590ad7c8cf2c52be5ca4022c136f05049fe61f8432ba5351b3ae7a2bbb99c483617861ad7c4e89
-
Filesize
208B
MD59322146f3aec3247a25c51b3bfb30486
SHA15a2cb3500d2cf4970edc4d00abb146c5b4c30084
SHA256ccc055acced29c5aef61127e0632bfd17176c215105e4510b4240d75df060307
SHA512be3bf733be92e9780bcd47bb2dce5382238b9add3b46104671f6fc38a368fdd08fa6f543559fb4ee3007ce27d5828e653f5387ee5a30fe0b41bd3f23c79b6ea1