Analysis
-
max time kernel
94s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26/09/2024, 00:40
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-26_c5e8350dca8ec1ac3db0e4af9b4df289_icedid_ramnit.exe
Resource
win7-20240903-en
General
-
Target
2024-09-26_c5e8350dca8ec1ac3db0e4af9b4df289_icedid_ramnit.exe
-
Size
592KB
-
MD5
c5e8350dca8ec1ac3db0e4af9b4df289
-
SHA1
e746f6e659cb794549b82c922d0ba3f289dd67c5
-
SHA256
34684017d19d2f7b106da522a22f34bb55848808213f8b25b9acb1d174e9e32d
-
SHA512
4866acffd0ee956e4f793feaf20fb08eb366fdbcc533c305ef3679741851153525334c6182343ec523ec9ab60cbf499bb032f0c6bcf870e6dade4377bed16c4d
-
SSDEEP
6144:yfqGm/TYtUcxGDaFIJyYLBDCzAUtpvhM1sdLhtloVWNV6a0hsp:yC5/M6uGW0ybnviaKYNVusp
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Signatures
-
Detects Bdaejec Backdoor. 1 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral2/memory/4588-59-0x0000000000150000-0x0000000000159000-memory.dmp family_bdaejec_backdoor -
resource yara_rule behavioral2/files/0x00080000000234c0-9.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation jynrxZ.exe -
Executes dropped EXE 2 IoCs
pid Process 4460 2024-09-26_c5e8350dca8ec1ac3db0e4af9b4df289_icedid_ramnitmgr.exe 4588 jynrxZ.exe -
Loads dropped DLL 1 IoCs
pid Process 4460 2024-09-26_c5e8350dca8ec1ac3db0e4af9b4df289_icedid_ramnitmgr.exe -
resource yara_rule behavioral2/memory/4460-11-0x0000000000400000-0x000000000045C000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe jynrxZ.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jabswitch.exe jynrxZ.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmiregistry.exe jynrxZ.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe jynrxZ.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSREC.EXE jynrxZ.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\OLicenseHeartbeat.exe jynrxZ.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\GetHelp.exe jynrxZ.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\policytool.exe jynrxZ.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javacpl.exe jynrxZ.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Wallet_2.4.18324.0_x64__8wekyb3d8bbwe\Microsoft.Wallet.exe jynrxZ.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxTsr.exe jynrxZ.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe jynrxZ.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdb.exe jynrxZ.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe jynrxZ.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java-rmi.exe jynrxZ.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\officeappguardwin32.exe jynrxZ.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\VPREVIEW.EXE jynrxZ.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\filecompare.exe jynrxZ.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe jynrxZ.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Time.exe jynrxZ.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe jynrxZ.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_x64__8wekyb3d8bbwe\GameBar.exe jynrxZ.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\AcroLayoutRecognizer.exe jynrxZ.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jps.exe jynrxZ.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\pack200.exe jynrxZ.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOICONS.EXE jynrxZ.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.DBConnection64.exe jynrxZ.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe jynrxZ.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrServicesUpdater.exe jynrxZ.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateOnDemand.exe jynrxZ.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe jynrxZ.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe jynrxZ.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Music.UI.exe jynrxZ.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\123.0.6312.123\chrome_installer.exe jynrxZ.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe jynrxZ.exe File opened for modification C:\Program Files\dotnet\dotnet.exe jynrxZ.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe jynrxZ.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdeps.exe jynrxZ.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOHTMED.EXE jynrxZ.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\NAMECONTROLSERVER.EXE jynrxZ.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\EQUATION\eqnedt32.exe jynrxZ.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\MSOHTMED.EXE jynrxZ.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\wow_helper.exe jynrxZ.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe jynrxZ.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\kinit.exe jynrxZ.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\MixedRealityPortal.Brokered.exe jynrxZ.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Xbox.TCUI_1.23.28002.0_x64__8wekyb3d8bbwe\TCUI-App.exe jynrxZ.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe jynrxZ.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe jynrxZ.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\pack200.exe jynrxZ.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe jynrxZ.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe jynrxZ.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsoft.Photos.exe jynrxZ.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroBroker.exe jynrxZ.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsimport.exe jynrxZ.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Wordconv.exe jynrxZ.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.ShowHelp.exe jynrxZ.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Cortana.exe jynrxZ.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jinfo.exe jynrxZ.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe jynrxZ.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ssvagent.exe jynrxZ.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.DBConnection.exe jynrxZ.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\LogTransport2.exe jynrxZ.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmiregistry.exe jynrxZ.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.dev.log 2024-09-26_c5e8350dca8ec1ac3db0e4af9b4df289_icedid_ramnit.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2744 4460 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-26_c5e8350dca8ec1ac3db0e4af9b4df289_icedid_ramnitmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jynrxZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-26_c5e8350dca8ec1ac3db0e4af9b4df289_icedid_ramnit.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 960 2024-09-26_c5e8350dca8ec1ac3db0e4af9b4df289_icedid_ramnit.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 960 wrote to memory of 4460 960 2024-09-26_c5e8350dca8ec1ac3db0e4af9b4df289_icedid_ramnit.exe 83 PID 960 wrote to memory of 4460 960 2024-09-26_c5e8350dca8ec1ac3db0e4af9b4df289_icedid_ramnit.exe 83 PID 960 wrote to memory of 4460 960 2024-09-26_c5e8350dca8ec1ac3db0e4af9b4df289_icedid_ramnit.exe 83 PID 960 wrote to memory of 4588 960 2024-09-26_c5e8350dca8ec1ac3db0e4af9b4df289_icedid_ramnit.exe 84 PID 960 wrote to memory of 4588 960 2024-09-26_c5e8350dca8ec1ac3db0e4af9b4df289_icedid_ramnit.exe 84 PID 960 wrote to memory of 4588 960 2024-09-26_c5e8350dca8ec1ac3db0e4af9b4df289_icedid_ramnit.exe 84 PID 4588 wrote to memory of 4156 4588 jynrxZ.exe 88 PID 4588 wrote to memory of 4156 4588 jynrxZ.exe 88 PID 4588 wrote to memory of 4156 4588 jynrxZ.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-26_c5e8350dca8ec1ac3db0e4af9b4df289_icedid_ramnit.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-26_c5e8350dca8ec1ac3db0e4af9b4df289_icedid_ramnit.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\2024-09-26_c5e8350dca8ec1ac3db0e4af9b4df289_icedid_ramnitmgr.exeC:\Users\Admin\AppData\Local\Temp\2024-09-26_c5e8350dca8ec1ac3db0e4af9b4df289_icedid_ramnitmgr.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4460 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4460 -s 4923⤵
- Program crash
PID:2744
-
-
-
C:\Users\Admin\AppData\Local\Temp\jynrxZ.exeC:\Users\Admin\AppData\Local\Temp\jynrxZ.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\50bb69db.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:4156
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4460 -ip 44601⤵PID:4628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4B
MD5d3b07384d113edec49eaa6238ad5ff00
SHA1f1d2d2f924e986ac86fdf7b36c94bcdf32beec15
SHA256b5bb9d8014a0f9b1d61e21e796d78dccdf1352f23cd32812f4850b878ae4944c
SHA5120cf9180a764aba863a67b6d72f0918bc131c6772642cb2dce5a34f0a702f9470ddc2bf125c12198b1995c233c34b4afd346c54a2334c350a948a51b6e8b4e6b6
-
Filesize
354KB
MD5a8245f71e4e4aff10e574300abd2bcc2
SHA17ea3ae53a0697e526c6bc877b103b390af042d7a
SHA2567bf945e4d87567106bfe8980b4fe1e6482578ab91fa9d82426c804ae5c3f2546
SHA5128c32f1f55c0475ce06ddbd3db80d529addb401089bd61491641d2e2c0c36020eabc5a947735388ae7a90514c543cb29450afa13b1e3f90387e432b62d4628978
-
Filesize
4B
MD520879c987e2f9a916e578386d499f629
SHA1c7b33ddcc42361fdb847036fc07e880b81935d5d
SHA2569f2981a7cc4d40a2a409dc895de64253acd819d7c0011c8e80b86fe899464e31
SHA512bcdde1625364dd6dd143b45bdcec8d59cf8982aff33790d390b839f3869e0e815684568b14b555a596d616252aeeaa98dac2e6e551c9095ea11a575ff25ff84f
-
Filesize
187B
MD5ef8aa5ddd42d3a6cc1de0f9ca03da30e
SHA1019f109ff1bd7e5978c80f37c091c20cdab25e98
SHA256c7981a72e89d246aa54fec9706bb961a5354b499b9a946122464eaf7b0874ea6
SHA512c37ab8bc04923aa91f6514d05bd72661d80fcdf763e2e942abd322494294cd10ebecd014205cfea07f85626cbc9734d9caee44ec6ab147eccaab618fecf73752
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219