Analysis
-
max time kernel
148s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08-03-2023 21:39
Static task
static1
Behavioral task
behavioral1
Sample
Installer.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Installer.exe
Resource
win10v2004-20230220-en
General
-
Target
Installer.exe
-
Size
5.0MB
-
MD5
7c54b7057111165aed5885a25a662284
-
SHA1
2427f02080a0f3040e82731f16d264b686b50d2a
-
SHA256
28b0e4a555f41d4709a7d180f2b951491efa80d054cad46c887059ac79d75745
-
SHA512
aa2e8228e1911fc1edbb264b925e01c750dff5a722d1dbe0144e40e497710e87591d9954cc04df8ee6aa92221f79411d3c7d39e1082cb5f0a6f710b4c67895dd
-
SSDEEP
98304:N9/3GjyyERJicIqAviJXjlsjBKF7ZHSAZginBJzCV9NAi5o8fWw:NlGjyyERMjTvAXjlgK5ZHdZginrCrNAg
Malware Config
Extracted
icexloader
http://golden-cheats.com/icex/Script.php
Signatures
-
Detects IceXLoader v3.0 4 IoCs
resource yara_rule behavioral2/memory/1840-140-0x0000000000400000-0x0000000000451000-memory.dmp family_icexloader_v3 behavioral2/memory/1840-142-0x0000000000400000-0x0000000000451000-memory.dmp family_icexloader_v3 behavioral2/memory/1840-144-0x0000000000400000-0x0000000000451000-memory.dmp family_icexloader_v3 behavioral2/memory/1840-145-0x0000000000400000-0x0000000000451000-memory.dmp family_icexloader_v3 -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"," Installer.exe -
icexloader
IceXLoader is a downloader used to deliver other malware families.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation Installer.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 436 set thread context of 1840 436 Installer.exe 103 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
pid Process 3792 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 436 Installer.exe 436 Installer.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 436 Installer.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 436 wrote to memory of 2904 436 Installer.exe 84 PID 436 wrote to memory of 2904 436 Installer.exe 84 PID 436 wrote to memory of 2904 436 Installer.exe 84 PID 436 wrote to memory of 4536 436 Installer.exe 92 PID 436 wrote to memory of 4536 436 Installer.exe 92 PID 436 wrote to memory of 4536 436 Installer.exe 92 PID 4536 wrote to memory of 3792 4536 cmd.exe 94 PID 4536 wrote to memory of 3792 4536 cmd.exe 94 PID 4536 wrote to memory of 3792 4536 cmd.exe 94 PID 436 wrote to memory of 1840 436 Installer.exe 103 PID 436 wrote to memory of 1840 436 Installer.exe 103 PID 436 wrote to memory of 1840 436 Installer.exe 103 PID 436 wrote to memory of 1840 436 Installer.exe 103 PID 436 wrote to memory of 1840 436 Installer.exe 103 PID 436 wrote to memory of 1840 436 Installer.exe 103 PID 436 wrote to memory of 1840 436 Installer.exe 103 PID 436 wrote to memory of 1840 436 Installer.exe 103 PID 436 wrote to memory of 1840 436 Installer.exe 103 PID 436 wrote to memory of 1840 436 Installer.exe 103 PID 436 wrote to memory of 1840 436 Installer.exe 103 PID 436 wrote to memory of 1840 436 Installer.exe 103 PID 436 wrote to memory of 1840 436 Installer.exe 103 PID 436 wrote to memory of 1840 436 Installer.exe 103 PID 436 wrote to memory of 1840 436 Installer.exe 103 PID 436 wrote to memory of 1840 436 Installer.exe 103 PID 436 wrote to memory of 1840 436 Installer.exe 103 PID 436 wrote to memory of 1840 436 Installer.exe 103 PID 436 wrote to memory of 1840 436 Installer.exe 103 PID 436 wrote to memory of 1840 436 Installer.exe 103 PID 436 wrote to memory of 1840 436 Installer.exe 103 PID 436 wrote to memory of 1840 436 Installer.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\Installer.exe"C:\Users\Admin\AppData\Local\Temp\Installer.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:2904
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 452⤵
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\SysWOW64\timeout.exetimeout 453⤵
- Delays execution with timeout.exe
PID:3792
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵PID:1840
-