Analysis

  • max time kernel
    332s
  • max time network
    370s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-11-2022 11:45

General

  • Target

    79915a1352da45f69fbd193f7bd28bba64949dfe6c2baf8090151e676aad2448.exe

  • Size

    348KB

  • MD5

    6210be523c5fab6a205772fc1a6abfb4

  • SHA1

    b9ad3b37702aa0187592fb39b26148d8b320b6ca

  • SHA256

    79915a1352da45f69fbd193f7bd28bba64949dfe6c2baf8090151e676aad2448

  • SHA512

    a98fb903c1d9f2d23a9a7a67e8bc7f27228f054105ac43413e6887ff8c0de29968b5d71218a116f7f73a814a8be4bc50b4c78c4e913c5da1b1083c51c80fbdab

  • SSDEEP

    6144:ZbslI7b8btZ1WMYORbMV9bwkn8gfyVQhAyPlb/2:ZbvwnEMtWwk3fyVQhAyPlb/2

Malware Config

Signatures

  • icexloader

    IceXLoader is a downloader used to deliver other malware families.

  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\79915a1352da45f69fbd193f7bd28bba64949dfe6c2baf8090151e676aad2448.exe
    "C:\Users\Admin\AppData\Local\Temp\79915a1352da45f69fbd193f7bd28bba64949dfe6c2baf8090151e676aad2448.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4836
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c "C:\Users\Admin\AppData\Local\Temp\file.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2092
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command Set-MpPreference -DisableRealtimeMonitoring $true
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4892
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command Add-MpPreference -ExclusionExtension "C:\Users\Admin\AppData\Roaming\ICE X\.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5060
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2956

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    3d086a433708053f9bf9523e1d87a4e8

    SHA1

    b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28

    SHA256

    6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69

    SHA512

    931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

    Filesize

    52KB

    MD5

    8294000aea14b51c76d175f828e0fde2

    SHA1

    15c19cf30efa2a5739058bab6a2e3daa8d3092b6

    SHA256

    7f2d5208d5a40a1eb4698e06aa2dec4a13f37cddc2d934924490ddfaf3c57d9c

    SHA512

    5a075d690f2fe5fe0af913936dfb9f3813fddef62902cd1d7ef1127d1f4e4d2beafc40836b59a0bdf21f6b9a87da01daa755a378b799fdcb58b54611be313b6a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    39ef46502ba302b11a9d3576967a249b

    SHA1

    3c33854675ffc05d2d8d18c69d7475a455ae9dc7

    SHA256

    d5ab9682555abef27349d3fb6ddf3898f0ee5716e0c3c21fcc5c6d08f8340b19

    SHA512

    0d85be07b95a90189cb1eb525a437c5f17379335952cad70a09ce0d66f89f6d0b4c9b315fdee9b74dc5a5d1cf69e4dff3b1e6b40fc6d3143c4fabcbb5e810f7c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    17KB

    MD5

    180bde13f0c0f1319746a79aae51b387

    SHA1

    279eb1fd4ae95db2e0eaa21f8002164fb2b1414b

    SHA256

    3316adb45fd873daa38753c12176825f6e6c6c39ebf055ce8831a8a7759d3797

    SHA512

    3cebd96ffa17db1fd8d6e782eca619412c5c20ee6a21f0922234c1eb5eb2c257550ed4206cc74225907dd3ee866281d9e0cb5fa282afb73fec417ea4502d4806

  • C:\Users\Admin\AppData\Local\Temp\file.bat

    Filesize

    239B

    MD5

    f6e9a890d89cbc6684cc81fdba858cb4

    SHA1

    352924f71a6debb722a31af9d9a2c9bc157f6593

    SHA256

    7300f298f3baf29ec7dfcffb6ed84a14eea910dd323d845f9c343990b8754c51

    SHA512

    e0ddd4bdc29b355937be75ea90b1c8a0b4e9ce631364fcc35635a7f33b7e00a4a245402456cf17364a91a61cf1a551f2fb49d3f25133a4e488a5f379014264d9

  • memory/2092-132-0x0000000000000000-mapping.dmp

  • memory/2956-158-0x0000000070150000-0x000000007019C000-memory.dmp

    Filesize

    304KB

  • memory/2956-156-0x0000000000000000-mapping.dmp

  • memory/4892-144-0x0000000007B00000-0x000000000817A000-memory.dmp

    Filesize

    6.5MB

  • memory/4892-149-0x0000000007460000-0x000000000747A000-memory.dmp

    Filesize

    104KB

  • memory/4892-142-0x0000000070150000-0x000000007019C000-memory.dmp

    Filesize

    304KB

  • memory/4892-143-0x00000000066D0000-0x00000000066EE000-memory.dmp

    Filesize

    120KB

  • memory/4892-140-0x00000000061A0000-0x00000000061BE000-memory.dmp

    Filesize

    120KB

  • memory/4892-145-0x0000000007480000-0x000000000749A000-memory.dmp

    Filesize

    104KB

  • memory/4892-146-0x00000000074C0000-0x00000000074CA000-memory.dmp

    Filesize

    40KB

  • memory/4892-147-0x00000000076B0000-0x0000000007746000-memory.dmp

    Filesize

    600KB

  • memory/4892-148-0x0000000007450000-0x000000000745E000-memory.dmp

    Filesize

    56KB

  • memory/4892-141-0x00000000066F0000-0x0000000006722000-memory.dmp

    Filesize

    200KB

  • memory/4892-150-0x0000000000B00000-0x0000000000B08000-memory.dmp

    Filesize

    32KB

  • memory/4892-134-0x0000000000000000-mapping.dmp

  • memory/4892-139-0x0000000005D00000-0x0000000005D66000-memory.dmp

    Filesize

    408KB

  • memory/4892-138-0x0000000005C90000-0x0000000005CF6000-memory.dmp

    Filesize

    408KB

  • memory/4892-137-0x0000000005A50000-0x0000000005A72000-memory.dmp

    Filesize

    136KB

  • memory/4892-135-0x0000000004B70000-0x0000000004BA6000-memory.dmp

    Filesize

    216KB

  • memory/4892-136-0x00000000051E0000-0x0000000005808000-memory.dmp

    Filesize

    6.2MB

  • memory/5060-155-0x0000000070150000-0x000000007019C000-memory.dmp

    Filesize

    304KB

  • memory/5060-151-0x0000000000000000-mapping.dmp