Analysis
-
max time kernel
95s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 01:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-21_0cf078084380fed6fd4442e48b2c444c_icedid.exe
Resource
win7-20241023-en
General
-
Target
2024-12-21_0cf078084380fed6fd4442e48b2c444c_icedid.exe
-
Size
1.1MB
-
MD5
0cf078084380fed6fd4442e48b2c444c
-
SHA1
b495baad7740ade6c58ee1a64e40432a23aa0c94
-
SHA256
ebc62243a0a801c9966c98befa5f0a30ffaea13f30a3f705911373ac0d71b410
-
SHA512
3093261a01f796fd7dbcaf9895fa0e6cc6379ce3e5488f98e6c547ba38c46a9fa86dffe81cc357e0a19c3096bf1b88350027aac7bb509856b299296ef2930c9a
-
SSDEEP
12288:lDxjQa1iQWYkWDMZA/95zeFSqsarFossFFy2f/r2AgERqwa6mi/qION7MwQ3LkvB:lDpQa1iLYpDx/Hz01sFQSz2AghjaZ3QZ
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 4 IoCs
resource yara_rule behavioral2/memory/4240-1-0x00000000025F0000-0x0000000002631000-memory.dmp family_blackmoon behavioral2/memory/1504-8-0x0000000002420000-0x0000000002461000-memory.dmp family_blackmoon behavioral2/memory/4240-10-0x00000000025F0000-0x0000000002631000-memory.dmp family_blackmoon behavioral2/memory/1504-39-0x0000000002420000-0x0000000002461000-memory.dmp family_blackmoon -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RTVHTzgq.exe -
Deletes itself 1 IoCs
pid Process 1504 RTVHTzgq.exe -
Executes dropped EXE 1 IoCs
pid Process 1504 RTVHTzgq.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RTVHTzgq.exe -
resource yara_rule behavioral2/memory/4240-0-0x0000000002520000-0x000000000252B000-memory.dmp upx behavioral2/memory/4240-2-0x0000000002520000-0x000000000252B000-memory.dmp upx behavioral2/memory/1504-7-0x0000000002480000-0x000000000248B000-memory.dmp upx behavioral2/memory/1504-9-0x0000000002480000-0x000000000248B000-memory.dmp upx behavioral2/memory/1504-14-0x00000000024D0000-0x00000000024DB000-memory.dmp upx behavioral2/memory/1504-40-0x0000000002480000-0x000000000248B000-memory.dmp upx behavioral2/memory/1504-44-0x00000000024D0000-0x00000000024DB000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-21_0cf078084380fed6fd4442e48b2c444c_icedid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RTVHTzgq.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RTVHTzgq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz RTVHTzgq.exe -
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\YfDUMw Yskct\Shell\Open RTVHTzgq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\YfDUMw Yskct\Shell\Open\Command\ = "\"C:\\Users\\Public\\Downloads\\RTVHTzgq.exe\"sEvGcrcO QbkiWcyq icckZOsD" RTVHTzgq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.GTtx RTVHTzgq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.GTtx\ = "YfDUMw Yskct" RTVHTzgq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\YfDUMw Yskct\Shell\Open\Command RTVHTzgq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\YfDUMw Yskct RTVHTzgq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\YfDUMw Yskct\Shell RTVHTzgq.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4240 2024-12-21_0cf078084380fed6fd4442e48b2c444c_icedid.exe 4240 2024-12-21_0cf078084380fed6fd4442e48b2c444c_icedid.exe 1504 RTVHTzgq.exe 1504 RTVHTzgq.exe 1504 RTVHTzgq.exe 1504 RTVHTzgq.exe 1504 RTVHTzgq.exe 1504 RTVHTzgq.exe 1504 RTVHTzgq.exe 1504 RTVHTzgq.exe 1504 RTVHTzgq.exe 1504 RTVHTzgq.exe 1504 RTVHTzgq.exe 1504 RTVHTzgq.exe 1504 RTVHTzgq.exe 1504 RTVHTzgq.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1504 RTVHTzgq.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4240 2024-12-21_0cf078084380fed6fd4442e48b2c444c_icedid.exe 4240 2024-12-21_0cf078084380fed6fd4442e48b2c444c_icedid.exe 1504 RTVHTzgq.exe 1504 RTVHTzgq.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4240 wrote to memory of 1504 4240 2024-12-21_0cf078084380fed6fd4442e48b2c444c_icedid.exe 82 PID 4240 wrote to memory of 1504 4240 2024-12-21_0cf078084380fed6fd4442e48b2c444c_icedid.exe 82 PID 4240 wrote to memory of 1504 4240 2024-12-21_0cf078084380fed6fd4442e48b2c444c_icedid.exe 82 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RTVHTzgq.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-21_0cf078084380fed6fd4442e48b2c444c_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-21_0cf078084380fed6fd4442e48b2c444c_icedid.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Users\Public\Downloads\RTVHTzgq.exeSrIFuBRBqFMwaPtm2⤵
- UAC bypass
- Deletes itself
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1504
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD50cf078084380fed6fd4442e48b2c444c
SHA1b495baad7740ade6c58ee1a64e40432a23aa0c94
SHA256ebc62243a0a801c9966c98befa5f0a30ffaea13f30a3f705911373ac0d71b410
SHA5123093261a01f796fd7dbcaf9895fa0e6cc6379ce3e5488f98e6c547ba38c46a9fa86dffe81cc357e0a19c3096bf1b88350027aac7bb509856b299296ef2930c9a