Analysis
-
max time kernel
155s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
13-07-2022 18:22
Static task
static1
Behavioral task
behavioral1
Sample
619356420efd4dc53704fb5eb5c93f1f5d4a0123ed1fdd5ce276a832381de51d.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
619356420efd4dc53704fb5eb5c93f1f5d4a0123ed1fdd5ce276a832381de51d.exe
Resource
win10v2004-20220414-en
General
-
Target
619356420efd4dc53704fb5eb5c93f1f5d4a0123ed1fdd5ce276a832381de51d.exe
-
Size
348KB
-
MD5
2be76cae2ba32867d8f244b65287d957
-
SHA1
6e7587064a02f11a831e0d9abb46603305e72665
-
SHA256
619356420efd4dc53704fb5eb5c93f1f5d4a0123ed1fdd5ce276a832381de51d
-
SHA512
748c6319825db2763941a639e640634fcdbf662d46ad683325e1e040fce6421152ec4a29d65cf9f26a4652dcb49570412b12930b8e79042d7bcbf4b71badab12
Malware Config
Signatures
-
Detects IceXLoader v3.0 2 IoCs
resource yara_rule behavioral2/files/0x000200000001e7f5-135.dat family_icexloader_v3 behavioral2/files/0x000200000001e7f5-136.dat family_icexloader_v3 -
icexloader
IceXLoader is a downloader used to deliver other malware families.
-
Executes dropped EXE 1 IoCs
pid Process 2176 ICE X.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ICE X.exe 619356420efd4dc53704fb5eb5c93f1f5d4a0123ed1fdd5ce276a832381de51d.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows\CurrentVersion\Run 619356420efd4dc53704fb5eb5c93f1f5d4a0123ed1fdd5ce276a832381de51d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ICE X = "\"C:\\Users\\Admin\\AppData\\Roaming\\ICE X.exe\"" 619356420efd4dc53704fb5eb5c93f1f5d4a0123ed1fdd5ce276a832381de51d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 619356420efd4dc53704fb5eb5c93f1f5d4a0123ed1fdd5ce276a832381de51d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ICE X = "\"C:\\Users\\Admin\\AppData\\Roaming\\ICE X.exe\"" 619356420efd4dc53704fb5eb5c93f1f5d4a0123ed1fdd5ce276a832381de51d.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 1204 timeout.exe 2500 timeout.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1644 powershell.exe 1644 powershell.exe 1420 powershell.exe 1420 powershell.exe 3944 powershell.exe 3944 powershell.exe -
Suspicious use of AdjustPrivilegeToken 33 IoCs
description pid Process Token: SeDebugPrivilege 1644 powershell.exe Token: SeRemoteShutdownPrivilege 2176 ICE X.exe Token: SeRemoteShutdownPrivilege 2176 ICE X.exe Token: SeRemoteShutdownPrivilege 2176 ICE X.exe Token: SeRemoteShutdownPrivilege 2176 ICE X.exe Token: SeRemoteShutdownPrivilege 2176 ICE X.exe Token: SeRemoteShutdownPrivilege 2176 ICE X.exe Token: SeRemoteShutdownPrivilege 2176 ICE X.exe Token: SeRemoteShutdownPrivilege 2176 ICE X.exe Token: SeRemoteShutdownPrivilege 2176 ICE X.exe Token: SeRemoteShutdownPrivilege 2176 ICE X.exe Token: SeDebugPrivilege 1420 powershell.exe Token: SeDebugPrivilege 3944 powershell.exe Token: SeRemoteShutdownPrivilege 2176 ICE X.exe Token: SeRemoteShutdownPrivilege 2176 ICE X.exe Token: SeRemoteShutdownPrivilege 2176 ICE X.exe Token: SeRemoteShutdownPrivilege 2176 ICE X.exe Token: SeRemoteShutdownPrivilege 2176 ICE X.exe Token: SeRemoteShutdownPrivilege 2176 ICE X.exe Token: SeRemoteShutdownPrivilege 2176 ICE X.exe Token: SeRemoteShutdownPrivilege 2176 ICE X.exe Token: SeRemoteShutdownPrivilege 2176 ICE X.exe Token: SeRemoteShutdownPrivilege 2176 ICE X.exe Token: SeRemoteShutdownPrivilege 2176 ICE X.exe Token: SeRemoteShutdownPrivilege 2176 ICE X.exe Token: SeRemoteShutdownPrivilege 2176 ICE X.exe Token: SeRemoteShutdownPrivilege 2176 ICE X.exe Token: SeRemoteShutdownPrivilege 2176 ICE X.exe Token: SeRemoteShutdownPrivilege 2176 ICE X.exe Token: SeRemoteShutdownPrivilege 2176 ICE X.exe Token: SeRemoteShutdownPrivilege 2176 ICE X.exe Token: SeRemoteShutdownPrivilege 2176 ICE X.exe Token: SeRemoteShutdownPrivilege 2176 ICE X.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 3768 wrote to memory of 3772 3768 619356420efd4dc53704fb5eb5c93f1f5d4a0123ed1fdd5ce276a832381de51d.exe 79 PID 3768 wrote to memory of 3772 3768 619356420efd4dc53704fb5eb5c93f1f5d4a0123ed1fdd5ce276a832381de51d.exe 79 PID 3768 wrote to memory of 3772 3768 619356420efd4dc53704fb5eb5c93f1f5d4a0123ed1fdd5ce276a832381de51d.exe 79 PID 3768 wrote to memory of 1988 3768 619356420efd4dc53704fb5eb5c93f1f5d4a0123ed1fdd5ce276a832381de51d.exe 80 PID 3768 wrote to memory of 1988 3768 619356420efd4dc53704fb5eb5c93f1f5d4a0123ed1fdd5ce276a832381de51d.exe 80 PID 3768 wrote to memory of 1988 3768 619356420efd4dc53704fb5eb5c93f1f5d4a0123ed1fdd5ce276a832381de51d.exe 80 PID 3772 wrote to memory of 1204 3772 cmd.exe 83 PID 3772 wrote to memory of 1204 3772 cmd.exe 83 PID 3772 wrote to memory of 1204 3772 cmd.exe 83 PID 1988 wrote to memory of 2500 1988 cmd.exe 84 PID 1988 wrote to memory of 2500 1988 cmd.exe 84 PID 1988 wrote to memory of 2500 1988 cmd.exe 84 PID 3772 wrote to memory of 2176 3772 cmd.exe 85 PID 3772 wrote to memory of 2176 3772 cmd.exe 85 PID 3772 wrote to memory of 2176 3772 cmd.exe 85 PID 2176 wrote to memory of 1984 2176 ICE X.exe 86 PID 2176 wrote to memory of 1984 2176 ICE X.exe 86 PID 2176 wrote to memory of 1984 2176 ICE X.exe 86 PID 1984 wrote to memory of 1644 1984 cmd.exe 88 PID 1984 wrote to memory of 1644 1984 cmd.exe 88 PID 1984 wrote to memory of 1644 1984 cmd.exe 88 PID 1984 wrote to memory of 1420 1984 cmd.exe 92 PID 1984 wrote to memory of 1420 1984 cmd.exe 92 PID 1984 wrote to memory of 1420 1984 cmd.exe 92 PID 1984 wrote to memory of 3944 1984 cmd.exe 94 PID 1984 wrote to memory of 3944 1984 cmd.exe 94 PID 1984 wrote to memory of 3944 1984 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\619356420efd4dc53704fb5eb5c93f1f5d4a0123ed1fdd5ce276a832381de51d.exe"C:\Users\Admin\AppData\Local\Temp\619356420efd4dc53704fb5eb5c93f1f5d4a0123ed1fdd5ce276a832381de51d.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Windows\SysWOW64\cmd.execmd /c timeout 2 & "C:\Users\Admin\AppData\Roaming\ICE X.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Windows\SysWOW64\timeout.exetimeout 23⤵
- Delays execution with timeout.exe
PID:1204
-
-
C:\Users\Admin\AppData\Roaming\ICE X.exe"C:\Users\Admin\AppData\Roaming\ICE X.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\file.bat"4⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Set-MpPreference -DisableRealtimeMonitoring $true5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1644
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionExtension "C:\Users\Admin\AppData\Roaming\ICE X\.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1420
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3944
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c timeout 1 & del /F "C:\Users\Admin\AppData\Local\Temp\619356420efd4dc53704fb5eb5c93f1f5d4a0123ed1fdd5ce276a832381de51d.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2500
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD546746fd65a1b4fb35c89a073dfe727cd
SHA1718a19e5af40a046c8661942e5e6b770901ccaee
SHA2564a3cbe50bf1fbbdc92c79b9c225da21f2d18c94da26c1749e7a94a4beef489c8
SHA5121f7ffa18701d54ed11e405b2c7e8998564adcfe9e8bc0370ff99fe64166da9dd9865619e7955cf0307f601ee1597168877640951dcfa94db06c2f165688469e0
-
Filesize
18KB
MD506544035534b49626d96ef90bc498ca2
SHA1bbdcd044fcec389901a3a7613c8e39d1e17ed32f
SHA25602adcd130712a5e44c7fcd3b3a507e6874b0b98043cc0134d653dbed9994ee71
SHA5121eccf3a4cff165a74bfdd0e93abaea6eca0ecf879a5d7444b5695bd3683632eb57bfa1011099b438a05bf7b8b7b232d9ce48b77e9e6e77356250a64a59b44927
-
Filesize
239B
MD5f6e9a890d89cbc6684cc81fdba858cb4
SHA1352924f71a6debb722a31af9d9a2c9bc157f6593
SHA2567300f298f3baf29ec7dfcffb6ed84a14eea910dd323d845f9c343990b8754c51
SHA512e0ddd4bdc29b355937be75ea90b1c8a0b4e9ce631364fcc35635a7f33b7e00a4a245402456cf17364a91a61cf1a551f2fb49d3f25133a4e488a5f379014264d9
-
Filesize
348KB
MD52be76cae2ba32867d8f244b65287d957
SHA16e7587064a02f11a831e0d9abb46603305e72665
SHA256619356420efd4dc53704fb5eb5c93f1f5d4a0123ed1fdd5ce276a832381de51d
SHA512748c6319825db2763941a639e640634fcdbf662d46ad683325e1e040fce6421152ec4a29d65cf9f26a4652dcb49570412b12930b8e79042d7bcbf4b71badab12
-
Filesize
348KB
MD52be76cae2ba32867d8f244b65287d957
SHA16e7587064a02f11a831e0d9abb46603305e72665
SHA256619356420efd4dc53704fb5eb5c93f1f5d4a0123ed1fdd5ce276a832381de51d
SHA512748c6319825db2763941a639e640634fcdbf662d46ad683325e1e040fce6421152ec4a29d65cf9f26a4652dcb49570412b12930b8e79042d7bcbf4b71badab12