Analysis

  • max time kernel
    62s
  • max time network
    64s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-09-2024 02:54

General

  • Target

    2024-09-12_8642242fc8dbe8de96ca8d1ce42f493a_hacktools_icedid_mimikatz.exe

  • Size

    8.5MB

  • MD5

    8642242fc8dbe8de96ca8d1ce42f493a

  • SHA1

    368a412d9724d89c8ad48562a153523a499cb677

  • SHA256

    ac7326fb31a5482160f84ecf4b2c491f4ec7194f859e5f4d520971a16c7eb5c9

  • SHA512

    39cbb680dd30248e9ac1ef3785a96f77de3c0dce1bbd0a99825f9d580182df61832d4d237a5d4607c223bff25627aac3e364ef71c301cdd7768e9f6a0d6c164a

  • SSDEEP

    196608:MxygkmknGzwHdOgEPHd9BRX/nivPlTXTYo:Y5jz0E51/iv1

Malware Config

Signatures

  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • mimikatz is an open source tool to dump credentials on Windows 4 IoCs
  • Drops file in Drivers directory 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 9 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 28 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • NSIS installer 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 5 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 58 IoCs
  • Suspicious use of SendNotifyMessage 58 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-12_8642242fc8dbe8de96ca8d1ce42f493a_hacktools_icedid_mimikatz.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-12_8642242fc8dbe8de96ca8d1ce42f493a_hacktools_icedid_mimikatz.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\ebetisly\upwllyl.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Suspicious use of WriteProcessMemory
      PID:2184
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 5
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:3972
      • C:\Windows\ebetisly\upwllyl.exe
        C:\Windows\ebetisly\upwllyl.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1516
  • C:\Windows\ebetisly\upwllyl.exe
    C:\Windows\ebetisly\upwllyl.exe
    1⤵
    • Drops file in Drivers directory
    • Executes dropped EXE
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1036
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1672
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4932
      • C:\Windows\SysWOW64\cacls.exe
        cacls C:\Windows\system32\drivers\etc\hosts /T /D users
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4812
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:5092
      • C:\Windows\SysWOW64\cacls.exe
        cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1648
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4832
      • C:\Windows\SysWOW64\cacls.exe
        cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2164
    • C:\Windows\SysWOW64\netsh.exe
      netsh ipsec static del all
      2⤵
      • Event Triggered Execution: Netsh Helper DLL
      • System Location Discovery: System Language Discovery
      PID:4636
    • C:\Windows\SysWOW64\netsh.exe
      netsh ipsec static add policy name=Bastards description=FuckingBastards
      2⤵
      • Event Triggered Execution: Netsh Helper DLL
      • System Location Discovery: System Language Discovery
      PID:4588
    • C:\Windows\SysWOW64\netsh.exe
      netsh ipsec static add filteraction name=BastardsList action=block
      2⤵
      • Event Triggered Execution: Netsh Helper DLL
      • System Location Discovery: System Language Discovery
      PID:1324
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\kvbeuieka\ebcevjhrl\wpcap.exe /S
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3236
      • C:\Windows\kvbeuieka\ebcevjhrl\wpcap.exe
        C:\Windows\kvbeuieka\ebcevjhrl\wpcap.exe /S
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2904
        • C:\Windows\SysWOW64\net.exe
          net stop "Boundary Meter"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2588
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Boundary Meter"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2976
        • C:\Windows\SysWOW64\net.exe
          net stop "TrueSight Meter"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3680
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "TrueSight Meter"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2168
        • C:\Windows\SysWOW64\net.exe
          net stop npf
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4732
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop npf
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1276
        • C:\Windows\SysWOW64\net.exe
          net start npf
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3648
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start npf
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1104
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c net start npf
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3604
      • C:\Windows\SysWOW64\net.exe
        net start npf
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2844
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 start npf
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2276
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /7
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2244

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Temp\nsb152B.tmp\System.dll

    Filesize

    11KB

    MD5

    2ae993a2ffec0c137eb51c8832691bcb

    SHA1

    98e0b37b7c14890f8a599f35678af5e9435906e1

    SHA256

    681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59

    SHA512

    2501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9

  • C:\Windows\Temp\nsb152B.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    b648c78981c02c434d6a04d4422a6198

    SHA1

    74d99eed1eae76c7f43454c01cdb7030e5772fc2

    SHA256

    3e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9

    SHA512

    219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2

  • C:\Windows\ebetisly\upwllyl.exe

    Filesize

    8.5MB

    MD5

    f779205644f6cbd4ed6a23e96057f809

    SHA1

    026b310155e39dd9ddf5f3fe37fa2746c13a568c

    SHA256

    655615e56fdc0c140d09979b41706fbc924b2d629b958f00c9b63cd86f0c325f

    SHA512

    cc8ab60697d7db5e821b685227370e8d836255ff6f2943459004f87c6e44ad121d7c65b3083383aaea19cd6dcb419e5a532dae2f428c4267634fb947d21ef7f3

  • C:\Windows\kvbeuieka\ebcevjhrl\wpcap.exe

    Filesize

    424KB

    MD5

    e9c001647c67e12666f27f9984778ad6

    SHA1

    51961af0a52a2cc3ff2c4149f8d7011490051977

    SHA256

    7ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d

    SHA512

    56f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe

  • C:\Windows\system32\drivers\etc\hosts

    Filesize

    1KB

    MD5

    c838e174298c403c2bbdf3cb4bdbb597

    SHA1

    70eeb7dfad9488f14351415800e67454e2b4b95b

    SHA256

    1891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53

    SHA512

    c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376

  • memory/1516-8-0x0000000000400000-0x0000000000A9B000-memory.dmp

    Filesize

    6.6MB

  • memory/1968-0-0x0000000000400000-0x0000000000A9B000-memory.dmp

    Filesize

    6.6MB

  • memory/1968-4-0x0000000000400000-0x0000000000A9B000-memory.dmp

    Filesize

    6.6MB

  • memory/2244-21-0x00000236706A0000-0x00000236706A1000-memory.dmp

    Filesize

    4KB

  • memory/2244-25-0x00000236706A0000-0x00000236706A1000-memory.dmp

    Filesize

    4KB

  • memory/2244-24-0x00000236706A0000-0x00000236706A1000-memory.dmp

    Filesize

    4KB

  • memory/2244-23-0x00000236706A0000-0x00000236706A1000-memory.dmp

    Filesize

    4KB

  • memory/2244-22-0x00000236706A0000-0x00000236706A1000-memory.dmp

    Filesize

    4KB

  • memory/2244-20-0x00000236706A0000-0x00000236706A1000-memory.dmp

    Filesize

    4KB

  • memory/2244-19-0x00000236706A0000-0x00000236706A1000-memory.dmp

    Filesize

    4KB

  • memory/2244-15-0x00000236706A0000-0x00000236706A1000-memory.dmp

    Filesize

    4KB

  • memory/2244-14-0x00000236706A0000-0x00000236706A1000-memory.dmp

    Filesize

    4KB

  • memory/2244-13-0x00000236706A0000-0x00000236706A1000-memory.dmp

    Filesize

    4KB