Analysis
-
max time kernel
94s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 01:28
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-21_0cf078084380fed6fd4442e48b2c444c_icedid.exe
Resource
win7-20241010-en
General
-
Target
2024-12-21_0cf078084380fed6fd4442e48b2c444c_icedid.exe
-
Size
1.1MB
-
MD5
0cf078084380fed6fd4442e48b2c444c
-
SHA1
b495baad7740ade6c58ee1a64e40432a23aa0c94
-
SHA256
ebc62243a0a801c9966c98befa5f0a30ffaea13f30a3f705911373ac0d71b410
-
SHA512
3093261a01f796fd7dbcaf9895fa0e6cc6379ce3e5488f98e6c547ba38c46a9fa86dffe81cc357e0a19c3096bf1b88350027aac7bb509856b299296ef2930c9a
-
SSDEEP
12288:lDxjQa1iQWYkWDMZA/95zeFSqsarFossFFy2f/r2AgERqwa6mi/qION7MwQ3LkvB:lDpQa1iLYpDx/Hz01sFQSz2AghjaZ3QZ
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 4 IoCs
resource yara_rule behavioral2/memory/3964-1-0x0000000006A00000-0x0000000006A41000-memory.dmp family_blackmoon behavioral2/memory/1424-8-0x0000000006AE0000-0x0000000006B21000-memory.dmp family_blackmoon behavioral2/memory/3964-10-0x0000000006A00000-0x0000000006A41000-memory.dmp family_blackmoon behavioral2/memory/1424-39-0x0000000006AE0000-0x0000000006B21000-memory.dmp family_blackmoon -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RTVHTzgq.exe -
Deletes itself 1 IoCs
pid Process 1424 RTVHTzgq.exe -
Executes dropped EXE 1 IoCs
pid Process 1424 RTVHTzgq.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RTVHTzgq.exe -
resource yara_rule behavioral2/memory/3964-0-0x0000000006A50000-0x0000000006A5B000-memory.dmp upx behavioral2/memory/3964-2-0x0000000006A50000-0x0000000006A5B000-memory.dmp upx behavioral2/memory/1424-7-0x0000000006B40000-0x0000000006B4B000-memory.dmp upx behavioral2/memory/1424-9-0x0000000006B40000-0x0000000006B4B000-memory.dmp upx behavioral2/memory/1424-14-0x00000000088D0000-0x00000000088DB000-memory.dmp upx behavioral2/memory/1424-13-0x00000000088D0000-0x00000000088DB000-memory.dmp upx behavioral2/memory/1424-42-0x0000000006B40000-0x0000000006B4B000-memory.dmp upx behavioral2/memory/1424-44-0x00000000088D0000-0x00000000088DB000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-21_0cf078084380fed6fd4442e48b2c444c_icedid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RTVHTzgq.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RTVHTzgq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz RTVHTzgq.exe -
Modifies registry class 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.GTtx\ = "YfDUMw Yskct" RTVHTzgq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\YfDUMw Yskct\Shell\Open\Command RTVHTzgq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\YfDUMw Yskct RTVHTzgq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\YfDUMw Yskct\Shell RTVHTzgq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\YfDUMw Yskct\Shell\Open RTVHTzgq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\YfDUMw Yskct\Shell\Open\Command\ = "\"C:\\Users\\Public\\Downloads\\RTVHTzgq.exe\"PmwGYNyF QbkiWcyq vsLwpPeh" RTVHTzgq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.GTtx RTVHTzgq.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3964 2024-12-21_0cf078084380fed6fd4442e48b2c444c_icedid.exe 3964 2024-12-21_0cf078084380fed6fd4442e48b2c444c_icedid.exe 1424 RTVHTzgq.exe 1424 RTVHTzgq.exe 1424 RTVHTzgq.exe 1424 RTVHTzgq.exe 1424 RTVHTzgq.exe 1424 RTVHTzgq.exe 1424 RTVHTzgq.exe 1424 RTVHTzgq.exe 1424 RTVHTzgq.exe 1424 RTVHTzgq.exe 1424 RTVHTzgq.exe 1424 RTVHTzgq.exe 1424 RTVHTzgq.exe 1424 RTVHTzgq.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1424 RTVHTzgq.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3964 2024-12-21_0cf078084380fed6fd4442e48b2c444c_icedid.exe 3964 2024-12-21_0cf078084380fed6fd4442e48b2c444c_icedid.exe 1424 RTVHTzgq.exe 1424 RTVHTzgq.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3964 wrote to memory of 1424 3964 2024-12-21_0cf078084380fed6fd4442e48b2c444c_icedid.exe 83 PID 3964 wrote to memory of 1424 3964 2024-12-21_0cf078084380fed6fd4442e48b2c444c_icedid.exe 83 PID 3964 wrote to memory of 1424 3964 2024-12-21_0cf078084380fed6fd4442e48b2c444c_icedid.exe 83 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RTVHTzgq.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-21_0cf078084380fed6fd4442e48b2c444c_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-21_0cf078084380fed6fd4442e48b2c444c_icedid.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Users\Public\Downloads\RTVHTzgq.exeCpsPskZgVRgOdsWa2⤵
- UAC bypass
- Deletes itself
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1424
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD50cf078084380fed6fd4442e48b2c444c
SHA1b495baad7740ade6c58ee1a64e40432a23aa0c94
SHA256ebc62243a0a801c9966c98befa5f0a30ffaea13f30a3f705911373ac0d71b410
SHA5123093261a01f796fd7dbcaf9895fa0e6cc6379ce3e5488f98e6c547ba38c46a9fa86dffe81cc357e0a19c3096bf1b88350027aac7bb509856b299296ef2930c9a