Analysis

  • max time kernel
    41s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    20-06-2022 17:55

General

  • Target

    6d98c8bdb20a85ef44677f3e7eed32c9fee0c18354e3365c28e11cb6130a8794.exe

  • Size

    348KB

  • MD5

    0075306f5fda6d70684ecd0f29a61f2e

  • SHA1

    4e9d843f432c27434898864258d53787c7b207f9

  • SHA256

    6d98c8bdb20a85ef44677f3e7eed32c9fee0c18354e3365c28e11cb6130a8794

  • SHA512

    a55d1d7b927d8923bd0d63cb0060358d081f0fddfc454b85087c0658a3e049ca9ba123994eb0be5307c2cd23131b456af382c81d7ef25e4483efec7f38a27e40

Malware Config

Signatures

  • Detects IceXLoader v3.0 ⋅ 4 IoCs
  • icexloader

    IceXLoader is a downloader used to deliver other malware families.

  • Executes dropped EXE ⋅ 1 IoCs
  • Deletes itself ⋅ 1 IoCs
  • Drops startup file ⋅ 1 IoCs
  • Loads dropped DLL ⋅ 2 IoCs
  • Adds Run key to start application ⋅ 2 TTPs 4 IoCs
  • Delays execution with timeout.exe ⋅ 2 IoCs
  • Suspicious behavior: EnumeratesProcesses ⋅ 1 IoCs
  • Suspicious use of AdjustPrivilegeToken ⋅ 1 IoCs
  • Suspicious use of WriteProcessMemory ⋅ 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d98c8bdb20a85ef44677f3e7eed32c9fee0c18354e3365c28e11cb6130a8794.exe
    "C:\Users\Admin\AppData\Local\Temp\6d98c8bdb20a85ef44677f3e7eed32c9fee0c18354e3365c28e11cb6130a8794.exe"
    Drops startup file
    Adds Run key to start application
    Suspicious use of WriteProcessMemory
    PID:336
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c timeout 2 & "C:\Users\Admin\AppData\Roaming\EGe.exe"
      Loads dropped DLL
      Suspicious use of WriteProcessMemory
      PID:1704
      • C:\Windows\SysWOW64\timeout.exe
        timeout 2
        Delays execution with timeout.exe
        PID:2020
      • C:\Users\Admin\AppData\Roaming\EGe.exe
        "C:\Users\Admin\AppData\Roaming\EGe.exe"
        Executes dropped EXE
        Suspicious use of WriteProcessMemory
        PID:2040
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c "C:\Users\Admin\AppData\Local\Temp\file.bat"
          Suspicious use of WriteProcessMemory
          PID:1808
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -Command Set-MpPreference -DisableRealtimeMonitoring $true
            Suspicious behavior: EnumeratesProcesses
            Suspicious use of AdjustPrivilegeToken
            PID:928
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c timeout 1 & del /F "C:\Users\Admin\AppData\Local\Temp\6d98c8bdb20a85ef44677f3e7eed32c9fee0c18354e3365c28e11cb6130a8794.exe"
      Deletes itself
      Suspicious use of WriteProcessMemory
      PID:1716
      • C:\Windows\SysWOW64\timeout.exe
        timeout 1
        Delays execution with timeout.exe
        PID:1296

Network

MITRE ATT&CK Matrix

Collection

    Command and Control

      Credential Access

        Defense Evasion

        Discovery

          Execution

            Exfiltration

              Impact

                Initial Access

                  Lateral Movement

                    Privilege Escalation

                      Replay Monitor

                      00:00 00:00

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\file.bat
                        Filesize

                        237B

                        MD5

                        92f81be29f73852cd4b4c90c05587137

                        SHA1

                        99fc680c6e41734b0d79d957dc124ef272d04241

                        SHA256

                        f8242358557a69f6a079a5c1b2c821b2429740ac51a11643949a237f027bf133

                        SHA512

                        a1bc282b8da2794fa0f1de1f102867bf9baca8d0bf28546757a4c42b1f24ac31f1b5b0f7c3756dadd9802d58f4da7312e0ce992c17079e7f418060c14b472481

                      • C:\Users\Admin\AppData\Roaming\EGe.exe
                        Filesize

                        348KB

                        MD5

                        0075306f5fda6d70684ecd0f29a61f2e

                        SHA1

                        4e9d843f432c27434898864258d53787c7b207f9

                        SHA256

                        6d98c8bdb20a85ef44677f3e7eed32c9fee0c18354e3365c28e11cb6130a8794

                        SHA512

                        a55d1d7b927d8923bd0d63cb0060358d081f0fddfc454b85087c0658a3e049ca9ba123994eb0be5307c2cd23131b456af382c81d7ef25e4483efec7f38a27e40

                      • C:\Users\Admin\AppData\Roaming\EGe.exe
                        Filesize

                        348KB

                        MD5

                        0075306f5fda6d70684ecd0f29a61f2e

                        SHA1

                        4e9d843f432c27434898864258d53787c7b207f9

                        SHA256

                        6d98c8bdb20a85ef44677f3e7eed32c9fee0c18354e3365c28e11cb6130a8794

                        SHA512

                        a55d1d7b927d8923bd0d63cb0060358d081f0fddfc454b85087c0658a3e049ca9ba123994eb0be5307c2cd23131b456af382c81d7ef25e4483efec7f38a27e40

                      • \Users\Admin\AppData\Roaming\EGe.exe
                        Filesize

                        348KB

                        MD5

                        0075306f5fda6d70684ecd0f29a61f2e

                        SHA1

                        4e9d843f432c27434898864258d53787c7b207f9

                        SHA256

                        6d98c8bdb20a85ef44677f3e7eed32c9fee0c18354e3365c28e11cb6130a8794

                        SHA512

                        a55d1d7b927d8923bd0d63cb0060358d081f0fddfc454b85087c0658a3e049ca9ba123994eb0be5307c2cd23131b456af382c81d7ef25e4483efec7f38a27e40

                      • \Users\Admin\AppData\Roaming\EGe.exe
                        Filesize

                        348KB

                        MD5

                        0075306f5fda6d70684ecd0f29a61f2e

                        SHA1

                        4e9d843f432c27434898864258d53787c7b207f9

                        SHA256

                        6d98c8bdb20a85ef44677f3e7eed32c9fee0c18354e3365c28e11cb6130a8794

                        SHA512

                        a55d1d7b927d8923bd0d63cb0060358d081f0fddfc454b85087c0658a3e049ca9ba123994eb0be5307c2cd23131b456af382c81d7ef25e4483efec7f38a27e40

                      • memory/336-54-0x0000000075781000-0x0000000075783000-memory.dmp
                        Filesize

                        8KB

                      • memory/928-67-0x0000000000000000-mapping.dmp
                      • memory/928-69-0x0000000073D50000-0x00000000742FB000-memory.dmp
                        Filesize

                        5MB

                      • memory/928-70-0x0000000073D50000-0x00000000742FB000-memory.dmp
                        Filesize

                        5MB

                      • memory/1296-57-0x0000000000000000-mapping.dmp
                      • memory/1704-55-0x0000000000000000-mapping.dmp
                      • memory/1716-56-0x0000000000000000-mapping.dmp
                      • memory/1808-65-0x0000000000000000-mapping.dmp
                      • memory/2020-58-0x0000000000000000-mapping.dmp
                      • memory/2040-62-0x0000000000000000-mapping.dmp