Analysis

  • max time kernel
    143s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/07/2024, 00:34

General

  • Target

    2024-07-27_f5ea12474b1461fec0a6a88a3831062f_icedid_sakula.exe

  • Size

    22.7MB

  • MD5

    f5ea12474b1461fec0a6a88a3831062f

  • SHA1

    cfab2004544d5bbbd97123ac51f49a998cd61df4

  • SHA256

    a8a3270b145e813fae09d59b0526235d37148eb53e2b44068c71cd4d28786f96

  • SHA512

    2febd7b296488efdc83ccbe6a4a288f131e13842677d5f41c81a9546671e909c5e965a1c1742687ea7d7e924c04c9137797532ec8273b0dc5b88e61a7ff85528

  • SSDEEP

    196608:ZEYpB1oNKPLCuSJlCuA5GLAlyFzG/ArV/fT/Tn82QDZE7N/Y:qQyNKPLCuS3CD/k1T7B7y

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 13 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-07-27_f5ea12474b1461fec0a6a88a3831062f_icedid_sakula.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-07-27_f5ea12474b1461fec0a6a88a3831062f_icedid_sakula.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2752
    • C:\Users\Admin\Documents\Tomcat.exe
      "C:\Users\Admin\Documents\Tomcat.exe"
      2⤵
      • Deletes itself
      • Drops startup file
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Documents\Tomcat.exe

    Filesize

    1.6MB

    MD5

    d6e6d04854f4453e988f8bc095e47ef4

    SHA1

    4bd700e4eb85a370b3c294cd2cc4ad97f04c138d

    SHA256

    dfa45f10e99685ac308504d54be2e13301aeee1a74d36c6c67a5053068459670

    SHA512

    db679a7d3dede62e70a4880c547f097e2906e2d1025f5843c6590ad7c8cf2c52be5ca4022c136f05049fe61f8432ba5351b3ae7a2bbb99c483617861ad7c4e89

  • C:\Users\Admin\Documents\conf.ini

    Filesize

    208B

    MD5

    9322146f3aec3247a25c51b3bfb30486

    SHA1

    5a2cb3500d2cf4970edc4d00abb146c5b4c30084

    SHA256

    ccc055acced29c5aef61127e0632bfd17176c215105e4510b4240d75df060307

    SHA512

    be3bf733be92e9780bcd47bb2dce5382238b9add3b46104671f6fc38a368fdd08fa6f543559fb4ee3007ce27d5828e653f5387ee5a30fe0b41bd3f23c79b6ea1

  • memory/916-21-0x0000000000770000-0x000000000092B000-memory.dmp

    Filesize

    1.7MB

  • memory/916-34-0x0000000000770000-0x000000000092B000-memory.dmp

    Filesize

    1.7MB

  • memory/916-12-0x0000000010000000-0x0000000010109000-memory.dmp

    Filesize

    1.0MB

  • memory/916-24-0x0000000000770000-0x000000000092B000-memory.dmp

    Filesize

    1.7MB

  • memory/916-29-0x0000000000770000-0x000000000092B000-memory.dmp

    Filesize

    1.7MB

  • memory/916-28-0x0000000000770000-0x000000000092B000-memory.dmp

    Filesize

    1.7MB

  • memory/916-27-0x0000000000770000-0x000000000092B000-memory.dmp

    Filesize

    1.7MB

  • memory/916-30-0x0000000000770000-0x000000000092B000-memory.dmp

    Filesize

    1.7MB

  • memory/916-17-0x00000000007CB000-0x00000000007CC000-memory.dmp

    Filesize

    4KB

  • memory/916-31-0x0000000000770000-0x000000000092B000-memory.dmp

    Filesize

    1.7MB

  • memory/916-61-0x00000000035C0000-0x0000000003619000-memory.dmp

    Filesize

    356KB

  • memory/916-23-0x0000000000770000-0x000000000092B000-memory.dmp

    Filesize

    1.7MB

  • memory/916-33-0x0000000000770000-0x000000000092B000-memory.dmp

    Filesize

    1.7MB

  • memory/916-22-0x0000000001440000-0x0000000001458000-memory.dmp

    Filesize

    96KB

  • memory/916-59-0x00000000035C0000-0x0000000003619000-memory.dmp

    Filesize

    356KB

  • memory/916-56-0x00000000035C0000-0x0000000003619000-memory.dmp

    Filesize

    356KB

  • memory/916-26-0x00000000035C0000-0x0000000003619000-memory.dmp

    Filesize

    356KB

  • memory/916-19-0x0000000001400000-0x000000000142B000-memory.dmp

    Filesize

    172KB

  • memory/916-35-0x0000000000770000-0x000000000092B000-memory.dmp

    Filesize

    1.7MB

  • memory/916-38-0x00000000035C0000-0x0000000003619000-memory.dmp

    Filesize

    356KB

  • memory/916-39-0x00000000035C0000-0x0000000003619000-memory.dmp

    Filesize

    356KB

  • memory/916-41-0x0000000000770000-0x000000000092B000-memory.dmp

    Filesize

    1.7MB

  • memory/916-43-0x00000000035C0000-0x0000000003619000-memory.dmp

    Filesize

    356KB

  • memory/916-44-0x00000000035C0000-0x0000000003619000-memory.dmp

    Filesize

    356KB

  • memory/916-47-0x00000000035C0000-0x0000000003619000-memory.dmp

    Filesize

    356KB

  • memory/916-48-0x00000000035C0000-0x0000000003619000-memory.dmp

    Filesize

    356KB

  • memory/916-51-0x00000000035C0000-0x0000000003619000-memory.dmp

    Filesize

    356KB

  • memory/916-52-0x00000000035C0000-0x0000000003619000-memory.dmp

    Filesize

    356KB

  • memory/916-55-0x00000000035C0000-0x0000000003619000-memory.dmp

    Filesize

    356KB

  • memory/2752-1-0x0000000006880000-0x00000000068A7000-memory.dmp

    Filesize

    156KB

  • memory/2752-3-0x0000000010000000-0x0000000010014000-memory.dmp

    Filesize

    80KB

  • memory/2752-2-0x0000000010000000-0x0000000010014000-memory.dmp

    Filesize

    80KB