Analysis
-
max time kernel
41s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-06-2022 17:55
Static task
static1
Behavioral task
behavioral1
Sample
6d98c8bdb20a85ef44677f3e7eed32c9fee0c18354e3365c28e11cb6130a8794.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
6d98c8bdb20a85ef44677f3e7eed32c9fee0c18354e3365c28e11cb6130a8794.exe
Resource
win10v2004-20220414-en
General
-
Target
6d98c8bdb20a85ef44677f3e7eed32c9fee0c18354e3365c28e11cb6130a8794.exe
-
Size
348KB
-
MD5
0075306f5fda6d70684ecd0f29a61f2e
-
SHA1
4e9d843f432c27434898864258d53787c7b207f9
-
SHA256
6d98c8bdb20a85ef44677f3e7eed32c9fee0c18354e3365c28e11cb6130a8794
-
SHA512
a55d1d7b927d8923bd0d63cb0060358d081f0fddfc454b85087c0658a3e049ca9ba123994eb0be5307c2cd23131b456af382c81d7ef25e4483efec7f38a27e40
Malware Config
Signatures
-
Detects IceXLoader v3.0 ⋅ 4 IoCs
Processes:
resource yara_rule behavioral1/files/0x000a000000003c9f-59.dat family_icexloader_v3 behavioral1/files/0x000a000000003c9f-60.dat family_icexloader_v3 behavioral1/files/0x000a000000003c9f-61.dat family_icexloader_v3 behavioral1/files/0x000a000000003c9f-63.dat family_icexloader_v3 -
icexloader
IceXLoader is a downloader used to deliver other malware families.
-
Executes dropped EXE ⋅ 1 IoCs
Processes:
EGe.exepid process 2040 EGe.exe -
Deletes itself ⋅ 1 IoCs
Processes:
cmd.exepid process 1716 cmd.exe -
Drops startup file ⋅ 1 IoCs
Processes:
6d98c8bdb20a85ef44677f3e7eed32c9fee0c18354e3365c28e11cb6130a8794.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EGe.exe 6d98c8bdb20a85ef44677f3e7eed32c9fee0c18354e3365c28e11cb6130a8794.exe -
Loads dropped DLL ⋅ 2 IoCs
Processes:
cmd.exepid process 1704 cmd.exe 1704 cmd.exe -
Adds Run key to start application ⋅ 2 TTPs 4 IoCs
Processes:
6d98c8bdb20a85ef44677f3e7eed32c9fee0c18354e3365c28e11cb6130a8794.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run 6d98c8bdb20a85ef44677f3e7eed32c9fee0c18354e3365c28e11cb6130a8794.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\EGe = "\"C:\\Users\\Admin\\AppData\\Roaming\\EGe.exe\"" 6d98c8bdb20a85ef44677f3e7eed32c9fee0c18354e3365c28e11cb6130a8794.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 6d98c8bdb20a85ef44677f3e7eed32c9fee0c18354e3365c28e11cb6130a8794.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGe = "\"C:\\Users\\Admin\\AppData\\Roaming\\EGe.exe\"" 6d98c8bdb20a85ef44677f3e7eed32c9fee0c18354e3365c28e11cb6130a8794.exe -
Delays execution with timeout.exe ⋅ 2 IoCs
Processes:
timeout.exetimeout.exepid process 1296 timeout.exe 2020 timeout.exe -
Suspicious behavior: EnumeratesProcesses ⋅ 1 IoCs
Processes:
powershell.exepid process 928 powershell.exe -
Suspicious use of AdjustPrivilegeToken ⋅ 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 928 powershell.exe -
Suspicious use of WriteProcessMemory ⋅ 28 IoCs
Processes:
6d98c8bdb20a85ef44677f3e7eed32c9fee0c18354e3365c28e11cb6130a8794.execmd.execmd.exeEGe.execmd.exedescription pid process target process PID 336 wrote to memory of 1704 336 6d98c8bdb20a85ef44677f3e7eed32c9fee0c18354e3365c28e11cb6130a8794.exe cmd.exe PID 336 wrote to memory of 1704 336 6d98c8bdb20a85ef44677f3e7eed32c9fee0c18354e3365c28e11cb6130a8794.exe cmd.exe PID 336 wrote to memory of 1704 336 6d98c8bdb20a85ef44677f3e7eed32c9fee0c18354e3365c28e11cb6130a8794.exe cmd.exe PID 336 wrote to memory of 1704 336 6d98c8bdb20a85ef44677f3e7eed32c9fee0c18354e3365c28e11cb6130a8794.exe cmd.exe PID 336 wrote to memory of 1716 336 6d98c8bdb20a85ef44677f3e7eed32c9fee0c18354e3365c28e11cb6130a8794.exe cmd.exe PID 336 wrote to memory of 1716 336 6d98c8bdb20a85ef44677f3e7eed32c9fee0c18354e3365c28e11cb6130a8794.exe cmd.exe PID 336 wrote to memory of 1716 336 6d98c8bdb20a85ef44677f3e7eed32c9fee0c18354e3365c28e11cb6130a8794.exe cmd.exe PID 336 wrote to memory of 1716 336 6d98c8bdb20a85ef44677f3e7eed32c9fee0c18354e3365c28e11cb6130a8794.exe cmd.exe PID 1716 wrote to memory of 1296 1716 cmd.exe timeout.exe PID 1716 wrote to memory of 1296 1716 cmd.exe timeout.exe PID 1716 wrote to memory of 1296 1716 cmd.exe timeout.exe PID 1716 wrote to memory of 1296 1716 cmd.exe timeout.exe PID 1704 wrote to memory of 2020 1704 cmd.exe timeout.exe PID 1704 wrote to memory of 2020 1704 cmd.exe timeout.exe PID 1704 wrote to memory of 2020 1704 cmd.exe timeout.exe PID 1704 wrote to memory of 2020 1704 cmd.exe timeout.exe PID 1704 wrote to memory of 2040 1704 cmd.exe EGe.exe PID 1704 wrote to memory of 2040 1704 cmd.exe EGe.exe PID 1704 wrote to memory of 2040 1704 cmd.exe EGe.exe PID 1704 wrote to memory of 2040 1704 cmd.exe EGe.exe PID 2040 wrote to memory of 1808 2040 EGe.exe cmd.exe PID 2040 wrote to memory of 1808 2040 EGe.exe cmd.exe PID 2040 wrote to memory of 1808 2040 EGe.exe cmd.exe PID 2040 wrote to memory of 1808 2040 EGe.exe cmd.exe PID 1808 wrote to memory of 928 1808 cmd.exe powershell.exe PID 1808 wrote to memory of 928 1808 cmd.exe powershell.exe PID 1808 wrote to memory of 928 1808 cmd.exe powershell.exe PID 1808 wrote to memory of 928 1808 cmd.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d98c8bdb20a85ef44677f3e7eed32c9fee0c18354e3365c28e11cb6130a8794.exe"C:\Users\Admin\AppData\Local\Temp\6d98c8bdb20a85ef44677f3e7eed32c9fee0c18354e3365c28e11cb6130a8794.exe"Drops startup fileAdds Run key to start applicationSuspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c timeout 2 & "C:\Users\Admin\AppData\Roaming\EGe.exe"Loads dropped DLLSuspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 2Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\EGe.exe"C:\Users\Admin\AppData\Roaming\EGe.exe"Executes dropped EXESuspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\file.bat"Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Set-MpPreference -DisableRealtimeMonitoring $trueSuspicious behavior: EnumeratesProcessesSuspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c timeout 1 & del /F "C:\Users\Admin\AppData\Local\Temp\6d98c8bdb20a85ef44677f3e7eed32c9fee0c18354e3365c28e11cb6130a8794.exe"Deletes itselfSuspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 1Delays execution with timeout.exe
Network
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Replay Monitor
Downloads
-
C:\Users\Admin\AppData\Local\Temp\file.batFilesize
237B
MD592f81be29f73852cd4b4c90c05587137
SHA199fc680c6e41734b0d79d957dc124ef272d04241
SHA256f8242358557a69f6a079a5c1b2c821b2429740ac51a11643949a237f027bf133
SHA512a1bc282b8da2794fa0f1de1f102867bf9baca8d0bf28546757a4c42b1f24ac31f1b5b0f7c3756dadd9802d58f4da7312e0ce992c17079e7f418060c14b472481
-
C:\Users\Admin\AppData\Roaming\EGe.exeFilesize
348KB
MD50075306f5fda6d70684ecd0f29a61f2e
SHA14e9d843f432c27434898864258d53787c7b207f9
SHA2566d98c8bdb20a85ef44677f3e7eed32c9fee0c18354e3365c28e11cb6130a8794
SHA512a55d1d7b927d8923bd0d63cb0060358d081f0fddfc454b85087c0658a3e049ca9ba123994eb0be5307c2cd23131b456af382c81d7ef25e4483efec7f38a27e40
-
C:\Users\Admin\AppData\Roaming\EGe.exeFilesize
348KB
MD50075306f5fda6d70684ecd0f29a61f2e
SHA14e9d843f432c27434898864258d53787c7b207f9
SHA2566d98c8bdb20a85ef44677f3e7eed32c9fee0c18354e3365c28e11cb6130a8794
SHA512a55d1d7b927d8923bd0d63cb0060358d081f0fddfc454b85087c0658a3e049ca9ba123994eb0be5307c2cd23131b456af382c81d7ef25e4483efec7f38a27e40
-
\Users\Admin\AppData\Roaming\EGe.exeFilesize
348KB
MD50075306f5fda6d70684ecd0f29a61f2e
SHA14e9d843f432c27434898864258d53787c7b207f9
SHA2566d98c8bdb20a85ef44677f3e7eed32c9fee0c18354e3365c28e11cb6130a8794
SHA512a55d1d7b927d8923bd0d63cb0060358d081f0fddfc454b85087c0658a3e049ca9ba123994eb0be5307c2cd23131b456af382c81d7ef25e4483efec7f38a27e40
-
\Users\Admin\AppData\Roaming\EGe.exeFilesize
348KB
MD50075306f5fda6d70684ecd0f29a61f2e
SHA14e9d843f432c27434898864258d53787c7b207f9
SHA2566d98c8bdb20a85ef44677f3e7eed32c9fee0c18354e3365c28e11cb6130a8794
SHA512a55d1d7b927d8923bd0d63cb0060358d081f0fddfc454b85087c0658a3e049ca9ba123994eb0be5307c2cd23131b456af382c81d7ef25e4483efec7f38a27e40
-
memory/336-54-0x0000000075781000-0x0000000075783000-memory.dmpFilesize
8KB
-
memory/928-67-0x0000000000000000-mapping.dmp
-
memory/928-69-0x0000000073D50000-0x00000000742FB000-memory.dmpFilesize
5MB
-
memory/928-70-0x0000000073D50000-0x00000000742FB000-memory.dmpFilesize
5MB
-
memory/1296-57-0x0000000000000000-mapping.dmp
-
memory/1704-55-0x0000000000000000-mapping.dmp
-
memory/1716-56-0x0000000000000000-mapping.dmp
-
memory/1808-65-0x0000000000000000-mapping.dmp
-
memory/2020-58-0x0000000000000000-mapping.dmp
-
memory/2040-62-0x0000000000000000-mapping.dmp