Analysis
-
max time kernel
332s -
max time network
370s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2022 11:45
Behavioral task
behavioral1
Sample
79915a1352da45f69fbd193f7bd28bba64949dfe6c2baf8090151e676aad2448.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
79915a1352da45f69fbd193f7bd28bba64949dfe6c2baf8090151e676aad2448.exe
Resource
win10v2004-20221111-en
General
-
Target
79915a1352da45f69fbd193f7bd28bba64949dfe6c2baf8090151e676aad2448.exe
-
Size
348KB
-
MD5
6210be523c5fab6a205772fc1a6abfb4
-
SHA1
b9ad3b37702aa0187592fb39b26148d8b320b6ca
-
SHA256
79915a1352da45f69fbd193f7bd28bba64949dfe6c2baf8090151e676aad2448
-
SHA512
a98fb903c1d9f2d23a9a7a67e8bc7f27228f054105ac43413e6887ff8c0de29968b5d71218a116f7f73a814a8be4bc50b4c78c4e913c5da1b1083c51c80fbdab
-
SSDEEP
6144:ZbslI7b8btZ1WMYORbMV9bwkn8gfyVQhAyPlb/2:ZbvwnEMtWwk3fyVQhAyPlb/2
Malware Config
Signatures
-
icexloader
IceXLoader is a downloader used to deliver other malware families.
-
Drops startup file 1 IoCs
Processes:
79915a1352da45f69fbd193f7bd28bba64949dfe6c2baf8090151e676aad2448.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ICE X.exe 79915a1352da45f69fbd193f7bd28bba64949dfe6c2baf8090151e676aad2448.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
79915a1352da45f69fbd193f7bd28bba64949dfe6c2baf8090151e676aad2448.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Windows\CurrentVersion\Run 79915a1352da45f69fbd193f7bd28bba64949dfe6c2baf8090151e676aad2448.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ICE X = "\"C:\\Users\\Admin\\AppData\\Roaming\\ICE X.exe\"" 79915a1352da45f69fbd193f7bd28bba64949dfe6c2baf8090151e676aad2448.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 79915a1352da45f69fbd193f7bd28bba64949dfe6c2baf8090151e676aad2448.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ICE X = "\"C:\\Users\\Admin\\AppData\\Roaming\\ICE X.exe\"" 79915a1352da45f69fbd193f7bd28bba64949dfe6c2baf8090151e676aad2448.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
powershell.exepowershell.exepowershell.exepid process 4892 powershell.exe 4892 powershell.exe 5060 powershell.exe 5060 powershell.exe 2956 powershell.exe 2956 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 4892 powershell.exe Token: SeDebugPrivilege 5060 powershell.exe Token: SeDebugPrivilege 2956 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
79915a1352da45f69fbd193f7bd28bba64949dfe6c2baf8090151e676aad2448.execmd.exedescription pid process target process PID 4836 wrote to memory of 2092 4836 79915a1352da45f69fbd193f7bd28bba64949dfe6c2baf8090151e676aad2448.exe cmd.exe PID 4836 wrote to memory of 2092 4836 79915a1352da45f69fbd193f7bd28bba64949dfe6c2baf8090151e676aad2448.exe cmd.exe PID 4836 wrote to memory of 2092 4836 79915a1352da45f69fbd193f7bd28bba64949dfe6c2baf8090151e676aad2448.exe cmd.exe PID 2092 wrote to memory of 4892 2092 cmd.exe powershell.exe PID 2092 wrote to memory of 4892 2092 cmd.exe powershell.exe PID 2092 wrote to memory of 4892 2092 cmd.exe powershell.exe PID 2092 wrote to memory of 5060 2092 cmd.exe powershell.exe PID 2092 wrote to memory of 5060 2092 cmd.exe powershell.exe PID 2092 wrote to memory of 5060 2092 cmd.exe powershell.exe PID 2092 wrote to memory of 2956 2092 cmd.exe powershell.exe PID 2092 wrote to memory of 2956 2092 cmd.exe powershell.exe PID 2092 wrote to memory of 2956 2092 cmd.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\79915a1352da45f69fbd193f7bd28bba64949dfe6c2baf8090151e676aad2448.exe"C:\Users\Admin\AppData\Local\Temp\79915a1352da45f69fbd193f7bd28bba64949dfe6c2baf8090151e676aad2448.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\file.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4892
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionExtension "C:\Users\Admin\AppData\Roaming\ICE X\.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5060
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2956
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
Filesize
52KB
MD58294000aea14b51c76d175f828e0fde2
SHA115c19cf30efa2a5739058bab6a2e3daa8d3092b6
SHA2567f2d5208d5a40a1eb4698e06aa2dec4a13f37cddc2d934924490ddfaf3c57d9c
SHA5125a075d690f2fe5fe0af913936dfb9f3813fddef62902cd1d7ef1127d1f4e4d2beafc40836b59a0bdf21f6b9a87da01daa755a378b799fdcb58b54611be313b6a
-
Filesize
18KB
MD539ef46502ba302b11a9d3576967a249b
SHA13c33854675ffc05d2d8d18c69d7475a455ae9dc7
SHA256d5ab9682555abef27349d3fb6ddf3898f0ee5716e0c3c21fcc5c6d08f8340b19
SHA5120d85be07b95a90189cb1eb525a437c5f17379335952cad70a09ce0d66f89f6d0b4c9b315fdee9b74dc5a5d1cf69e4dff3b1e6b40fc6d3143c4fabcbb5e810f7c
-
Filesize
17KB
MD5180bde13f0c0f1319746a79aae51b387
SHA1279eb1fd4ae95db2e0eaa21f8002164fb2b1414b
SHA2563316adb45fd873daa38753c12176825f6e6c6c39ebf055ce8831a8a7759d3797
SHA5123cebd96ffa17db1fd8d6e782eca619412c5c20ee6a21f0922234c1eb5eb2c257550ed4206cc74225907dd3ee866281d9e0cb5fa282afb73fec417ea4502d4806
-
Filesize
239B
MD5f6e9a890d89cbc6684cc81fdba858cb4
SHA1352924f71a6debb722a31af9d9a2c9bc157f6593
SHA2567300f298f3baf29ec7dfcffb6ed84a14eea910dd323d845f9c343990b8754c51
SHA512e0ddd4bdc29b355937be75ea90b1c8a0b4e9ce631364fcc35635a7f33b7e00a4a245402456cf17364a91a61cf1a551f2fb49d3f25133a4e488a5f379014264d9