Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-09-2022 01:56

General

  • Target

    79915A1352DA45F69FBD193F7BD28BBA64949DFE6C2BA.exe

  • Size

    348KB

  • MD5

    6210be523c5fab6a205772fc1a6abfb4

  • SHA1

    b9ad3b37702aa0187592fb39b26148d8b320b6ca

  • SHA256

    79915a1352da45f69fbd193f7bd28bba64949dfe6c2baf8090151e676aad2448

  • SHA512

    a98fb903c1d9f2d23a9a7a67e8bc7f27228f054105ac43413e6887ff8c0de29968b5d71218a116f7f73a814a8be4bc50b4c78c4e913c5da1b1083c51c80fbdab

  • SSDEEP

    6144:ZbslI7b8btZ1WMYORbMV9bwkn8gfyVQhAyPlb/2:ZbvwnEMtWwk3fyVQhAyPlb/2

Malware Config

Signatures

  • icexloader

    IceXLoader is a downloader used to deliver other malware families.

  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\79915A1352DA45F69FBD193F7BD28BBA64949DFE6C2BA.exe
    "C:\Users\Admin\AppData\Local\Temp\79915A1352DA45F69FBD193F7BD28BBA64949DFE6C2BA.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3520
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c "C:\Users\Admin\AppData\Local\Temp\file.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:632
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command Set-MpPreference -DisableRealtimeMonitoring $true
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3024
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command Add-MpPreference -ExclusionExtension "C:\Users\Admin\AppData\Roaming\ICE X\.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5040
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3740

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    968cb9309758126772781b83adb8a28f

    SHA1

    8da30e71accf186b2ba11da1797cf67f8f78b47c

    SHA256

    92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

    SHA512

    4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    82c0f2642e958cae54ef0b06275225be

    SHA1

    0cd6c8124e415cf119445354dc542a5823809108

    SHA256

    c8c83cece720edf88bbd85409b3fc4ef5a34ae2052220bad4f5a4fd804f51017

    SHA512

    98fa8d56bb0f014655d6ba0940a054a0382f515df098780007f5a303647420df7942027ce9d77de33087f3346f8435fb1732a6d22be0efa98b477f843c49e9ca

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    c0dcd61df7ec2ea83de8d2ff365084a3

    SHA1

    1deb72d0a3a37a4bca264a858db51581ec1b386c

    SHA256

    56b6b794e2bd58ccb5aaf41e994622815b1daac685d723f9b8326ce84902d221

    SHA512

    152fa825e62b8c9629f264f517413b1794fa9edc44159ae889aea296cf11c33d017bd0460812e37b33f7f484a38ecd8b16ca1ccd8d8b274473ff9b7b6a52785b

  • C:\Users\Admin\AppData\Local\Temp\file.bat

    Filesize

    239B

    MD5

    f6e9a890d89cbc6684cc81fdba858cb4

    SHA1

    352924f71a6debb722a31af9d9a2c9bc157f6593

    SHA256

    7300f298f3baf29ec7dfcffb6ed84a14eea910dd323d845f9c343990b8754c51

    SHA512

    e0ddd4bdc29b355937be75ea90b1c8a0b4e9ce631364fcc35635a7f33b7e00a4a245402456cf17364a91a61cf1a551f2fb49d3f25133a4e488a5f379014264d9

  • memory/3024-144-0x0000000007400000-0x0000000007A7A000-memory.dmp

    Filesize

    6.5MB

  • memory/3024-148-0x0000000006FF0000-0x0000000006FFE000-memory.dmp

    Filesize

    56KB

  • memory/3024-139-0x0000000005460000-0x00000000054C6000-memory.dmp

    Filesize

    408KB

  • memory/3024-140-0x0000000005AB0000-0x0000000005ACE000-memory.dmp

    Filesize

    120KB

  • memory/3024-141-0x0000000006C60000-0x0000000006C92000-memory.dmp

    Filesize

    200KB

  • memory/3024-142-0x0000000070610000-0x000000007065C000-memory.dmp

    Filesize

    304KB

  • memory/3024-143-0x0000000006060000-0x000000000607E000-memory.dmp

    Filesize

    120KB

  • memory/3024-137-0x0000000004AE0000-0x0000000004B02000-memory.dmp

    Filesize

    136KB

  • memory/3024-145-0x0000000006DB0000-0x0000000006DCA000-memory.dmp

    Filesize

    104KB

  • memory/3024-146-0x0000000006E10000-0x0000000006E1A000-memory.dmp

    Filesize

    40KB

  • memory/3024-147-0x0000000007040000-0x00000000070D6000-memory.dmp

    Filesize

    600KB

  • memory/3024-138-0x0000000004B80000-0x0000000004BE6000-memory.dmp

    Filesize

    408KB

  • memory/3024-149-0x00000000070E0000-0x00000000070FA000-memory.dmp

    Filesize

    104KB

  • memory/3024-150-0x0000000007030000-0x0000000007038000-memory.dmp

    Filesize

    32KB

  • memory/3024-136-0x0000000004D40000-0x0000000005368000-memory.dmp

    Filesize

    6.2MB

  • memory/3024-135-0x00000000024B0000-0x00000000024E6000-memory.dmp

    Filesize

    216KB

  • memory/3740-157-0x0000000070610000-0x000000007065C000-memory.dmp

    Filesize

    304KB

  • memory/5040-154-0x0000000070610000-0x000000007065C000-memory.dmp

    Filesize

    304KB