Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    16-08-2023 17:39

General

  • Target

    0b1d3c602ee13d079b90d40371f338d6_icedid_JC.exe

  • Size

    1.1MB

  • MD5

    0b1d3c602ee13d079b90d40371f338d6

  • SHA1

    f2a92834892b79d33d482c0c53ff591615429452

  • SHA256

    e5a4ba3b4bd70406783a3ae18ce1af20ead5563b62ce785b2d3af7c6f9a85ede

  • SHA512

    af50cb59180a4282f99388809cc2d2c68a38e4fd7b0e85119d856b92781b1d0b341eaa2202f9b7d4e04e30ef22c3410beb5dc2507f3789597f5a50388237c05d

  • SSDEEP

    24576:11wOZcTsKDqqywaTm0Z1heUSWGgx6PtaKzonK:z5iFyScGg6JoK

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 27 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b1d3c602ee13d079b90d40371f338d6_icedid_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\0b1d3c602ee13d079b90d40371f338d6_icedid_JC.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2528
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\SysWOW64\svchost.exe -k netsvcs
      2⤵
      • Adds policy Run key to start application
      • Drops startup file
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2940
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\dllcache\upnpcont.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\dllcache\upnpcont.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1480
        • C:\Windows\SysWOW64\svchost.exe
          C:\Windows\SysWOW64\svchost.exe -k netsvcs
          4⤵
          • Adds policy Run key to start application
          • Adds Run key to start application
          • Drops file in Windows directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:2024
  • C:\Windows\system32\efsui.exe
    efsui.exe /efs /keybackup
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2348
  • C:\Windows\system32\Dwm.exe
    "C:\Windows\system32\Dwm.exe"
    1⤵
      PID:1520

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\upnpcont.lnk

      Filesize

      1KB

      MD5

      6573ad8b5b23aa4ea478cf980cf8b705

      SHA1

      a80225a1d701fe09ca8b5dc6e6af5da2ed1d40d9

      SHA256

      755ff338ae2522e1686aaac320fbae1f11e29f863c1f9c48ca3f7e4d552a4496

      SHA512

      612929580914daa7a79efc9c4876fb7a031d440c80fe2260fe0014e5bbc68e807a0081d259aeb3c440aa21574b57a7ee176ae39ecca7426745c1250bbf0afc44

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\dllcache\upnpcont.exe

      Filesize

      1.1MB

      MD5

      0b1d3c602ee13d079b90d40371f338d6

      SHA1

      f2a92834892b79d33d482c0c53ff591615429452

      SHA256

      e5a4ba3b4bd70406783a3ae18ce1af20ead5563b62ce785b2d3af7c6f9a85ede

      SHA512

      af50cb59180a4282f99388809cc2d2c68a38e4fd7b0e85119d856b92781b1d0b341eaa2202f9b7d4e04e30ef22c3410beb5dc2507f3789597f5a50388237c05d

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\dllcache\upnpcont.exe

      Filesize

      1.1MB

      MD5

      0b1d3c602ee13d079b90d40371f338d6

      SHA1

      f2a92834892b79d33d482c0c53ff591615429452

      SHA256

      e5a4ba3b4bd70406783a3ae18ce1af20ead5563b62ce785b2d3af7c6f9a85ede

      SHA512

      af50cb59180a4282f99388809cc2d2c68a38e4fd7b0e85119d856b92781b1d0b341eaa2202f9b7d4e04e30ef22c3410beb5dc2507f3789597f5a50388237c05d

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\dllcache\upnpcont.exe

      Filesize

      1.1MB

      MD5

      0b1d3c602ee13d079b90d40371f338d6

      SHA1

      f2a92834892b79d33d482c0c53ff591615429452

      SHA256

      e5a4ba3b4bd70406783a3ae18ce1af20ead5563b62ce785b2d3af7c6f9a85ede

      SHA512

      af50cb59180a4282f99388809cc2d2c68a38e4fd7b0e85119d856b92781b1d0b341eaa2202f9b7d4e04e30ef22c3410beb5dc2507f3789597f5a50388237c05d

    • C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\upnpcont.lnk

      Filesize

      1KB

      MD5

      0fdbe7bb881d478dce71d5cf2c900d1e

      SHA1

      35ace148101e1620b7caeb95ab1e8a24c8e5166e

      SHA256

      e5804c23f8e3c0a2742d1cc7d02dfc9c3175444b08c0b38471d25caa0af7091f

      SHA512

      cccf367804645303b70c34b59f407b036711e2f11c87dd8ef1bd5dd52f687507fa0d047e078e8cad4f5ba3c0edcfa90c81c709036be25520e4420d0d6da439b8

    • \Users\Admin\AppData\Roaming\Microsoft\Windows\dllcache\upnpcont.exe

      Filesize

      1.1MB

      MD5

      0b1d3c602ee13d079b90d40371f338d6

      SHA1

      f2a92834892b79d33d482c0c53ff591615429452

      SHA256

      e5a4ba3b4bd70406783a3ae18ce1af20ead5563b62ce785b2d3af7c6f9a85ede

      SHA512

      af50cb59180a4282f99388809cc2d2c68a38e4fd7b0e85119d856b92781b1d0b341eaa2202f9b7d4e04e30ef22c3410beb5dc2507f3789597f5a50388237c05d

    • \Users\Admin\AppData\Roaming\Microsoft\Windows\dllcache\upnpcont.exe

      Filesize

      1.1MB

      MD5

      0b1d3c602ee13d079b90d40371f338d6

      SHA1

      f2a92834892b79d33d482c0c53ff591615429452

      SHA256

      e5a4ba3b4bd70406783a3ae18ce1af20ead5563b62ce785b2d3af7c6f9a85ede

      SHA512

      af50cb59180a4282f99388809cc2d2c68a38e4fd7b0e85119d856b92781b1d0b341eaa2202f9b7d4e04e30ef22c3410beb5dc2507f3789597f5a50388237c05d

    • \Users\Admin\AppData\Roaming\Microsoft\Windows\dllcache\upnpcont.exe

      Filesize

      1.1MB

      MD5

      0b1d3c602ee13d079b90d40371f338d6

      SHA1

      f2a92834892b79d33d482c0c53ff591615429452

      SHA256

      e5a4ba3b4bd70406783a3ae18ce1af20ead5563b62ce785b2d3af7c6f9a85ede

      SHA512

      af50cb59180a4282f99388809cc2d2c68a38e4fd7b0e85119d856b92781b1d0b341eaa2202f9b7d4e04e30ef22c3410beb5dc2507f3789597f5a50388237c05d

    • \Users\Admin\AppData\Roaming\Microsoft\Windows\dllcache\upnpcont.exe

      Filesize

      1.1MB

      MD5

      0b1d3c602ee13d079b90d40371f338d6

      SHA1

      f2a92834892b79d33d482c0c53ff591615429452

      SHA256

      e5a4ba3b4bd70406783a3ae18ce1af20ead5563b62ce785b2d3af7c6f9a85ede

      SHA512

      af50cb59180a4282f99388809cc2d2c68a38e4fd7b0e85119d856b92781b1d0b341eaa2202f9b7d4e04e30ef22c3410beb5dc2507f3789597f5a50388237c05d

    • \Users\Admin\AppData\Roaming\Microsoft\Windows\dllcache\upnpcont.exe

      Filesize

      1.1MB

      MD5

      0b1d3c602ee13d079b90d40371f338d6

      SHA1

      f2a92834892b79d33d482c0c53ff591615429452

      SHA256

      e5a4ba3b4bd70406783a3ae18ce1af20ead5563b62ce785b2d3af7c6f9a85ede

      SHA512

      af50cb59180a4282f99388809cc2d2c68a38e4fd7b0e85119d856b92781b1d0b341eaa2202f9b7d4e04e30ef22c3410beb5dc2507f3789597f5a50388237c05d

    • \Users\Admin\AppData\Roaming\Microsoft\Windows\dllcache\upnpcont.exe

      Filesize

      1.1MB

      MD5

      0b1d3c602ee13d079b90d40371f338d6

      SHA1

      f2a92834892b79d33d482c0c53ff591615429452

      SHA256

      e5a4ba3b4bd70406783a3ae18ce1af20ead5563b62ce785b2d3af7c6f9a85ede

      SHA512

      af50cb59180a4282f99388809cc2d2c68a38e4fd7b0e85119d856b92781b1d0b341eaa2202f9b7d4e04e30ef22c3410beb5dc2507f3789597f5a50388237c05d

    • \Users\Admin\AppData\Roaming\Microsoft\Windows\dllcache\upnpcont.exe

      Filesize

      1.1MB

      MD5

      0b1d3c602ee13d079b90d40371f338d6

      SHA1

      f2a92834892b79d33d482c0c53ff591615429452

      SHA256

      e5a4ba3b4bd70406783a3ae18ce1af20ead5563b62ce785b2d3af7c6f9a85ede

      SHA512

      af50cb59180a4282f99388809cc2d2c68a38e4fd7b0e85119d856b92781b1d0b341eaa2202f9b7d4e04e30ef22c3410beb5dc2507f3789597f5a50388237c05d

    • \Users\Admin\AppData\Roaming\Microsoft\Windows\dllcache\upnpcont.exe

      Filesize

      1.1MB

      MD5

      0b1d3c602ee13d079b90d40371f338d6

      SHA1

      f2a92834892b79d33d482c0c53ff591615429452

      SHA256

      e5a4ba3b4bd70406783a3ae18ce1af20ead5563b62ce785b2d3af7c6f9a85ede

      SHA512

      af50cb59180a4282f99388809cc2d2c68a38e4fd7b0e85119d856b92781b1d0b341eaa2202f9b7d4e04e30ef22c3410beb5dc2507f3789597f5a50388237c05d

    • memory/1168-301-0x0000000001CE0000-0x0000000001CF6000-memory.dmp

      Filesize

      88KB

    • memory/1168-314-0x0000000002680000-0x0000000002700000-memory.dmp

      Filesize

      512KB

    • memory/1168-356-0x0000000001CE0000-0x0000000001CF6000-memory.dmp

      Filesize

      88KB

    • memory/1168-416-0x0000000002680000-0x0000000002700000-memory.dmp

      Filesize

      512KB

    • memory/1284-417-0x00000000002A0000-0x00000000002B6000-memory.dmp

      Filesize

      88KB

    • memory/1284-467-0x00000000002A0000-0x00000000002B6000-memory.dmp

      Filesize

      88KB

    • memory/1284-418-0x0000000002540000-0x00000000025C0000-memory.dmp

      Filesize

      512KB

    • memory/1316-325-0x0000000003900000-0x0000000003980000-memory.dmp

      Filesize

      512KB

    • memory/1316-337-0x0000000003900000-0x0000000003980000-memory.dmp

      Filesize

      512KB

    • memory/1316-311-0x0000000003900000-0x0000000003980000-memory.dmp

      Filesize

      512KB

    • memory/1316-357-0x00000000776F1000-0x00000000776F2000-memory.dmp

      Filesize

      4KB

    • memory/1316-298-0x0000000002BB0000-0x0000000002BC6000-memory.dmp

      Filesize

      88KB

    • memory/1316-332-0x00000000776F1000-0x00000000776F2000-memory.dmp

      Filesize

      4KB

    • memory/1316-354-0x0000000002BB0000-0x0000000002BC6000-memory.dmp

      Filesize

      88KB

    • memory/1316-2102-0x0000000003900000-0x0000000003980000-memory.dmp

      Filesize

      512KB

    • memory/1316-403-0x0000000003900000-0x0000000003980000-memory.dmp

      Filesize

      512KB

    • memory/1316-307-0x00000000776F1000-0x00000000776F2000-memory.dmp

      Filesize

      4KB

    • memory/1316-359-0x0000000003900000-0x0000000003980000-memory.dmp

      Filesize

      512KB

    • memory/1316-480-0x0000000003900000-0x0000000003980000-memory.dmp

      Filesize

      512KB

    • memory/1316-471-0x0000000003900000-0x0000000003980000-memory.dmp

      Filesize

      512KB

    • memory/1316-1411-0x0000000003900000-0x0000000003980000-memory.dmp

      Filesize

      512KB

    • memory/1316-433-0x0000000003900000-0x0000000003980000-memory.dmp

      Filesize

      512KB

    • memory/1480-122-0x0000000000400000-0x0000000000526000-memory.dmp

      Filesize

      1.1MB

    • memory/1480-121-0x0000000000650000-0x0000000000651000-memory.dmp

      Filesize

      4KB

    • memory/1480-120-0x0000000000650000-0x0000000000651000-memory.dmp

      Filesize

      4KB

    • memory/1520-653-0x00000000776A0000-0x0000000077849000-memory.dmp

      Filesize

      1.7MB

    • memory/1520-634-0x0000000001AB0000-0x0000000001AC6000-memory.dmp

      Filesize

      88KB

    • memory/1520-638-0x00000000776A0000-0x0000000077849000-memory.dmp

      Filesize

      1.7MB

    • memory/1520-640-0x0000000002720000-0x00000000027A0000-memory.dmp

      Filesize

      512KB

    • memory/1520-656-0x00000000776A0000-0x0000000077849000-memory.dmp

      Filesize

      1.7MB

    • memory/1520-670-0x0000000001AB0000-0x0000000001AC6000-memory.dmp

      Filesize

      88KB

    • memory/1520-684-0x0000000002720000-0x00000000027A0000-memory.dmp

      Filesize

      512KB

    • memory/2024-134-0x0000000000930000-0x000000000099E000-memory.dmp

      Filesize

      440KB

    • memory/2024-139-0x0000000000930000-0x000000000099E000-memory.dmp

      Filesize

      440KB

    • memory/2024-162-0x0000000000930000-0x000000000099E000-memory.dmp

      Filesize

      440KB

    • memory/2024-128-0x0000000000930000-0x000000000099E000-memory.dmp

      Filesize

      440KB

    • memory/2024-153-0x0000000000930000-0x000000000099E000-memory.dmp

      Filesize

      440KB

    • memory/2024-152-0x0000000000930000-0x000000000099E000-memory.dmp

      Filesize

      440KB

    • memory/2024-127-0x0000000000930000-0x000000000099E000-memory.dmp

      Filesize

      440KB

    • memory/2024-317-0x0000000000930000-0x000000000099E000-memory.dmp

      Filesize

      440KB

    • memory/2024-322-0x0000000002150000-0x0000000002190000-memory.dmp

      Filesize

      256KB

    • memory/2024-151-0x0000000000930000-0x000000000099E000-memory.dmp

      Filesize

      440KB

    • memory/2024-149-0x0000000000930000-0x000000000099E000-memory.dmp

      Filesize

      440KB

    • memory/2024-145-0x0000000000930000-0x000000000099E000-memory.dmp

      Filesize

      440KB

    • memory/2024-146-0x0000000000930000-0x000000000099E000-memory.dmp

      Filesize

      440KB

    • memory/2024-142-0x0000000000930000-0x000000000099E000-memory.dmp

      Filesize

      440KB

    • memory/2024-130-0x0000000000930000-0x000000000099E000-memory.dmp

      Filesize

      440KB

    • memory/2024-129-0x0000000000930000-0x000000000099E000-memory.dmp

      Filesize

      440KB

    • memory/2024-135-0x0000000002150000-0x0000000002190000-memory.dmp

      Filesize

      256KB

    • memory/2024-168-0x000000007789F000-0x00000000778A0000-memory.dmp

      Filesize

      4KB

    • memory/2348-460-0x0000000002700000-0x0000000002780000-memory.dmp

      Filesize

      512KB

    • memory/2348-651-0x0000000002700000-0x0000000002780000-memory.dmp

      Filesize

      512KB

    • memory/2348-649-0x0000000000180000-0x0000000000196000-memory.dmp

      Filesize

      88KB

    • memory/2348-458-0x00000000776A0000-0x0000000077849000-memory.dmp

      Filesize

      1.7MB

    • memory/2348-456-0x0000000000180000-0x0000000000196000-memory.dmp

      Filesize

      88KB

    • memory/2348-461-0x00000000776A0000-0x0000000077849000-memory.dmp

      Filesize

      1.7MB

    • memory/2528-58-0x0000000000400000-0x0000000000526000-memory.dmp

      Filesize

      1.1MB

    • memory/2528-54-0x0000000000530000-0x00000000005B0000-memory.dmp

      Filesize

      512KB

    • memory/2528-55-0x0000000000670000-0x0000000000671000-memory.dmp

      Filesize

      4KB

    • memory/2528-57-0x0000000000530000-0x00000000005B0000-memory.dmp

      Filesize

      512KB

    • memory/2528-56-0x0000000000670000-0x0000000000671000-memory.dmp

      Filesize

      4KB

    • memory/2528-61-0x0000000000530000-0x00000000005B0000-memory.dmp

      Filesize

      512KB

    • memory/2528-70-0x0000000000400000-0x0000000000526000-memory.dmp

      Filesize

      1.1MB

    • memory/2940-76-0x0000000000560000-0x00000000005CE000-memory.dmp

      Filesize

      440KB

    • memory/2940-64-0x0000000000560000-0x00000000005CE000-memory.dmp

      Filesize

      440KB

    • memory/2940-65-0x0000000000560000-0x00000000005CE000-memory.dmp

      Filesize

      440KB

    • memory/2940-110-0x0000000000560000-0x00000000005CE000-memory.dmp

      Filesize

      440KB

    • memory/2940-66-0x0000000000560000-0x00000000005CE000-memory.dmp

      Filesize

      440KB

    • memory/2940-119-0x0000000000560000-0x0000000000568000-memory.dmp

      Filesize

      32KB

    • memory/2940-63-0x0000000000560000-0x00000000005CE000-memory.dmp

      Filesize

      440KB

    • memory/2940-71-0x0000000002010000-0x0000000002050000-memory.dmp

      Filesize

      256KB

    • memory/2940-72-0x0000000000560000-0x00000000005CE000-memory.dmp

      Filesize

      440KB