Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2022 01:06
Behavioral task
behavioral1
Sample
2ce02f14a85c2642cf3ac002fea418a3f5320d0de0cc065f0b0f1bfdf339cb59.bin.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2ce02f14a85c2642cf3ac002fea418a3f5320d0de0cc065f0b0f1bfdf339cb59.bin.exe
Resource
win10v2004-20220812-en
General
-
Target
2ce02f14a85c2642cf3ac002fea418a3f5320d0de0cc065f0b0f1bfdf339cb59.bin.exe
-
Size
348KB
-
MD5
d6b21df8cae11de41a09ddc530a42c19
-
SHA1
17bf628c1ac85079b96638aad0ea0e74efe7f1d7
-
SHA256
2ce02f14a85c2642cf3ac002fea418a3f5320d0de0cc065f0b0f1bfdf339cb59
-
SHA512
9f209f1fa036ca59dce5ae4c6a4ce1ebcaf9fa4c2e000089936ca6ea1f290b5f9653ac69f57b12d4cd0a35b1e15a874269b6ad303a1333769df77dd24bbbdcc3
-
SSDEEP
6144:XbslI7T8AzZV2MYORbAV9bQdnXgfyVQhAyPlb/2:XbvIkEMtiQdwfyVQhAyPlb/2
Malware Config
Signatures
-
icexloader
IceXLoader is a downloader used to deliver other malware families.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ICE X.exe 2ce02f14a85c2642cf3ac002fea418a3f5320d0de0cc065f0b0f1bfdf339cb59.bin.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run 2ce02f14a85c2642cf3ac002fea418a3f5320d0de0cc065f0b0f1bfdf339cb59.bin.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ICE X = "\"C:\\Users\\Admin\\AppData\\Roaming\\ICE X.exe\"" 2ce02f14a85c2642cf3ac002fea418a3f5320d0de0cc065f0b0f1bfdf339cb59.bin.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 2ce02f14a85c2642cf3ac002fea418a3f5320d0de0cc065f0b0f1bfdf339cb59.bin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ICE X = "\"C:\\Users\\Admin\\AppData\\Roaming\\ICE X.exe\"" 2ce02f14a85c2642cf3ac002fea418a3f5320d0de0cc065f0b0f1bfdf339cb59.bin.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5040 powershell.exe 5040 powershell.exe 4880 powershell.exe 4880 powershell.exe 952 powershell.exe 952 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5040 powershell.exe Token: SeDebugPrivilege 4880 powershell.exe Token: SeDebugPrivilege 952 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4388 wrote to memory of 5052 4388 2ce02f14a85c2642cf3ac002fea418a3f5320d0de0cc065f0b0f1bfdf339cb59.bin.exe 79 PID 4388 wrote to memory of 5052 4388 2ce02f14a85c2642cf3ac002fea418a3f5320d0de0cc065f0b0f1bfdf339cb59.bin.exe 79 PID 4388 wrote to memory of 5052 4388 2ce02f14a85c2642cf3ac002fea418a3f5320d0de0cc065f0b0f1bfdf339cb59.bin.exe 79 PID 5052 wrote to memory of 5040 5052 cmd.exe 81 PID 5052 wrote to memory of 5040 5052 cmd.exe 81 PID 5052 wrote to memory of 5040 5052 cmd.exe 81 PID 5052 wrote to memory of 4880 5052 cmd.exe 86 PID 5052 wrote to memory of 4880 5052 cmd.exe 86 PID 5052 wrote to memory of 4880 5052 cmd.exe 86 PID 5052 wrote to memory of 952 5052 cmd.exe 90 PID 5052 wrote to memory of 952 5052 cmd.exe 90 PID 5052 wrote to memory of 952 5052 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ce02f14a85c2642cf3ac002fea418a3f5320d0de0cc065f0b0f1bfdf339cb59.bin.exe"C:\Users\Admin\AppData\Local\Temp\2ce02f14a85c2642cf3ac002fea418a3f5320d0de0cc065f0b0f1bfdf339cb59.bin.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\file.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5040
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionExtension "C:\Users\Admin\AppData\Roaming\ICE X\.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4880
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:952
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD543ad656c200412b6e15c87197453f756
SHA1fc144182361cd76d9c0e2853cac24337211857cd
SHA2567086f53606da7e3175063d2333129260b53658e6ad4d556172ecda2ed3e15a8b
SHA5121517d799b4e87e88e4f991111ccf769dc5333d8a51f02969206d6ccde25cb79770020155f704e6047e2d876b50f59b0f810972343f5b5995ea3b145c5b97bc8c
-
Filesize
18KB
MD5914797fb9bf4905387f5d4ceb162495c
SHA1e7574674ef14d73ba43db922cef01cd1da6082b2
SHA2565447e005ea7291c503a1ad8a26fa61702ddff06ec14401feb67bd3222e4856d2
SHA51233265581160f9b4b4c455b51e71b1d0e2ba77f42c3711829eab7a8f2a23a951d78d60000eddbad989ca7294a957e2d92ae856d967b17de2b3f643a64e26fbe68
-
Filesize
239B
MD5f6e9a890d89cbc6684cc81fdba858cb4
SHA1352924f71a6debb722a31af9d9a2c9bc157f6593
SHA2567300f298f3baf29ec7dfcffb6ed84a14eea910dd323d845f9c343990b8754c51
SHA512e0ddd4bdc29b355937be75ea90b1c8a0b4e9ce631364fcc35635a7f33b7e00a4a245402456cf17364a91a61cf1a551f2fb49d3f25133a4e488a5f379014264d9