Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
14-11-2024 10:41
Static task
static1
Behavioral task
behavioral1
Sample
4640be3b45d5600049276a5a5d57bfd880d224d3628edbc16716f17abb6383aa.exe
Resource
win7-20241010-en
windows7-x64
4 signatures
150 seconds
General
-
Target
4640be3b45d5600049276a5a5d57bfd880d224d3628edbc16716f17abb6383aa.exe
-
Size
605KB
-
MD5
004ddd044033d43da09ed712172050ae
-
SHA1
06c7386fdc09b49d015e6b80040366bcd79f9064
-
SHA256
4640be3b45d5600049276a5a5d57bfd880d224d3628edbc16716f17abb6383aa
-
SHA512
6d3ccf61a233eac2edd99fe2f661ddbc4b8014cafb55d8bd1a01c6ae8af76441e3b92f46f3e1ad2ddcff9026419569f6e2507e38d830bd6120174a1fde7f68f5
-
SSDEEP
12288:/T6pHPYXMRfXSVGVb8meK1+clygE6YSUCNOio+iI7xM1:b6pPAMtXSVGlGnCFo+1Q
Malware Config
Extracted
Family
icedid
Campaign
997059431
C2
gintoonafa.com
Signatures
-
Icedid family
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2604 4640be3b45d5600049276a5a5d57bfd880d224d3628edbc16716f17abb6383aa.exe 2604 4640be3b45d5600049276a5a5d57bfd880d224d3628edbc16716f17abb6383aa.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 2928 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2928 AUDIODG.EXE Token: 33 2928 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2928 AUDIODG.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\4640be3b45d5600049276a5a5d57bfd880d224d3628edbc16716f17abb6383aa.exe"C:\Users\Admin\AppData\Local\Temp\4640be3b45d5600049276a5a5d57bfd880d224d3628edbc16716f17abb6383aa.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2604
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2776
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2e81⤵
- Suspicious use of AdjustPrivilegeToken
PID:2928