Analysis
-
max time kernel
134s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29-06-2024 20:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-29_df7483be5406be695b50b1f15d83bbb8_icedid_magniber.exe
Resource
win7-20240611-en
General
-
Target
2024-06-29_df7483be5406be695b50b1f15d83bbb8_icedid_magniber.exe
-
Size
671KB
-
MD5
df7483be5406be695b50b1f15d83bbb8
-
SHA1
69de8d0c0cead028805e8ac93ac6aa1bc95850aa
-
SHA256
011280573f3ffbf712b5c146749878c18d8f94d57f325c7f9435fc886331c09a
-
SHA512
7b73ee755af1365a32ac70b4b8658283089e35b3c967b2328b6ab2a9e36881083a87c03d072acfd47eb9fb7d010ae48c8c55a2ebf00bf30b748f4473aff0eb02
-
SSDEEP
12288:BhGEsm5TpQrNAosJcRl7Bflkby3SJTGfRCK8lizPpZlySdpvIWjuZ:f5v0rNAMXBflkG3BCKiizxhjuZ
Malware Config
Extracted
emotet
Epoch1
152.170.196.157:443
103.31.232.93:443
200.123.183.137:443
201.213.100.141:8080
70.32.115.157:8080
164.77.130.222:80
203.25.159.3:8080
184.57.130.8:80
190.147.137.153:443
91.83.93.124:7080
217.199.160.224:8080
190.57.130.142:443
185.94.252.12:80
77.55.211.77:8080
111.67.12.221:8080
5.45.108.146:8080
73.155.126.84:80
212.71.237.140:8080
5.196.35.138:7080
188.129.197.149:80
212.156.219.6:8080
113.190.254.245:80
37.187.6.63:8080
204.225.249.100:7080
152.231.89.226:80
177.66.190.130:80
149.62.173.247:8080
189.1.185.248:80
200.69.224.73:80
201.91.28.210:80
168.197.252.178:80
190.161.45.112:80
201.213.100.141:443
187.51.47.26:80
221.133.46.86:443
202.62.39.111:80
192.241.146.84:8080
93.147.137.162:80
47.150.248.161:80
190.210.236.139:80
65.24.85.214:80
177.139.131.143:443
114.109.179.60:80
151.237.36.220:80
185.94.252.13:443
177.73.3.204:80
152.170.108.99:443
46.214.11.172:80
177.188.121.26:443
181.31.211.181:80
186.3.232.68:80
12.162.84.2:8080
110.143.8.89:80
170.82.195.50:80
175.114.178.83:443
82.196.15.205:8080
190.229.148.144:80
170.81.48.2:80
181.30.69.50:80
91.236.4.234:443
190.147.165.160:465
203.122.18.234:8080
81.169.202.3:443
113.161.147.51:80
104.131.103.37:8080
61.92.159.208:8080
94.176.234.118:443
187.162.248.237:80
190.196.143.58:80
93.147.157.195:80
83.169.21.32:7080
190.181.235.46:80
143.0.87.101:80
172.104.169.32:8080
200.126.237.113:80
192.241.143.52:8080
186.68.48.204:443
50.28.51.143:8080
45.161.242.102:80
177.103.159.44:80
181.164.215.193:80
178.79.163.131:8080
201.213.32.59:80
104.236.161.64:8080
73.239.11.159:80
152.170.222.65:80
118.69.71.14:80
91.204.163.19:8090
181.61.224.26:80
104.131.41.185:8080
82.240.207.95:443
68.183.190.199:8080
2.47.112.152:80
49.176.162.90:80
59.120.5.154:80
190.24.243.186:80
77.90.136.129:8080
190.17.195.202:80
46.28.111.142:7080
187.162.250.23:80
179.127.59.210:443
72.47.248.48:7080
186.33.141.88:80
181.10.204.106:80
177.72.13.80:80
70.32.84.74:8080
185.94.252.27:443
177.38.15.151:80
179.62.26.236:80
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
CoreShellAPI.exepid process 1040 CoreShellAPI.exe 1040 CoreShellAPI.exe 1040 CoreShellAPI.exe 1040 CoreShellAPI.exe 1040 CoreShellAPI.exe 1040 CoreShellAPI.exe 1040 CoreShellAPI.exe 1040 CoreShellAPI.exe 1040 CoreShellAPI.exe 1040 CoreShellAPI.exe 1040 CoreShellAPI.exe 1040 CoreShellAPI.exe 1040 CoreShellAPI.exe 1040 CoreShellAPI.exe 1040 CoreShellAPI.exe 1040 CoreShellAPI.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
2024-06-29_df7483be5406be695b50b1f15d83bbb8_icedid_magniber.exepid process 3312 2024-06-29_df7483be5406be695b50b1f15d83bbb8_icedid_magniber.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
2024-06-29_df7483be5406be695b50b1f15d83bbb8_icedid_magniber.exeCoreShellAPI.exepid process 3312 2024-06-29_df7483be5406be695b50b1f15d83bbb8_icedid_magniber.exe 3312 2024-06-29_df7483be5406be695b50b1f15d83bbb8_icedid_magniber.exe 1040 CoreShellAPI.exe 1040 CoreShellAPI.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
2024-06-29_df7483be5406be695b50b1f15d83bbb8_icedid_magniber.exedescription pid process target process PID 3312 wrote to memory of 1040 3312 2024-06-29_df7483be5406be695b50b1f15d83bbb8_icedid_magniber.exe CoreShellAPI.exe PID 3312 wrote to memory of 1040 3312 2024-06-29_df7483be5406be695b50b1f15d83bbb8_icedid_magniber.exe CoreShellAPI.exe PID 3312 wrote to memory of 1040 3312 2024-06-29_df7483be5406be695b50b1f15d83bbb8_icedid_magniber.exe CoreShellAPI.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-29_df7483be5406be695b50b1f15d83bbb8_icedid_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-29_df7483be5406be695b50b1f15d83bbb8_icedid_magniber.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\CoreShellAPI\CoreShellAPI.exe"C:\Windows\SysWOW64\CoreShellAPI\CoreShellAPI.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3416,i,13879737908471496610,15335851594401413307,262144 --variations-seed-version --mojo-platform-channel-handle=4312 /prefetch:81⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1181767204-2009306918-3718769404-1000\0f5007522459c86e95ffcc62f32308f1_d2547453-e731-4fdf-8f92-95f955a44acaFilesize
1KB
MD5dc5dcdb642ccc94f7e8bf2b17fd26c0a
SHA11f4b685b075b93efe04cdb2851c2bd0c5705691f
SHA256f421b79d70194b73fb10d82a5c596fffa838b9bec226689ec972b69a13de0acb
SHA51267b2e07a90f73262371c8ac530b636d050d108c503e383c66b8b52847cea26ada213d8dc62cd572a402b5e819683c29918d2a5945f344571ae67a2ffa7fade67
-
memory/1040-13-0x00000000021A0000-0x00000000021AC000-memory.dmpFilesize
48KB
-
memory/3312-0-0x00000000007C0000-0x00000000007C2000-memory.dmpFilesize
8KB
-
memory/3312-4-0x00000000007E0000-0x00000000007EC000-memory.dmpFilesize
48KB
-
memory/3312-7-0x00000000007A0000-0x00000000007AA000-memory.dmpFilesize
40KB
-
memory/3312-8-0x0000000000400000-0x00000000004AE000-memory.dmpFilesize
696KB