Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12/02/2024, 05:47

General

  • Target

    2024-02-12_794c41111366cedfcf0ba1751361b46b_icedid.exe

  • Size

    13.1MB

  • MD5

    794c41111366cedfcf0ba1751361b46b

  • SHA1

    8149084076cb966752671f00ec479fb02eb98e0b

  • SHA256

    c78dd0feef4977b947a24a6c1b46bbaa19bdb1a083e87c27271a7b42075470bc

  • SHA512

    b781c6a81ad2fb2baa9fefaa246fc6811569a3550e5d16f09faf349832415a259cd60b760fa539b23fc5362eabb45061948ddfbc6960bf16caed50398ea7c402

  • SSDEEP

    393216:ejncwmatWZ+mgSbBXxKqLupZr6KbkeJOB:ejnBmapSDsu7eq

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Signatures

  • Modifies firewall policy service 2 TTPs 3 IoCs
  • Sality

    Sality is backdoor written in C++, first discovered in 2003.

  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 6 IoCs
  • Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality 37 IoCs
  • Modifies boot configuration data using bcdedit 1 TTPs 1 IoCs
  • UPX dump on OEP (original entry point) 37 IoCs
  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 14 IoCs
  • UPX packed file 36 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 7 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 2 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Windows\system32\DllHost.exe
    C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
    1⤵
      PID:2196
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1272
        • C:\Users\Admin\AppData\Local\Temp\2024-02-12_794c41111366cedfcf0ba1751361b46b_icedid.exe
          "C:\Users\Admin\AppData\Local\Temp\2024-02-12_794c41111366cedfcf0ba1751361b46b_icedid.exe"
          2⤵
          • Modifies firewall policy service
          • UAC bypass
          • Windows security bypass
          • Windows security modification
          • Checks whether UAC is enabled
          • Enumerates connected drives
          • Drops autorun.inf file
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:2516
          • C:\Windows\system32\cmd.exe
            cmd.exe /c bcdedit.exe > "C:\Users\Admin\AppData\Local\Temp\usb3B6B.tmp"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1968
            • C:\Windows\system32\bcdedit.exe
              bcdedit.exe
              4⤵
                PID:2472
            • C:\Windows\system32\bcdedit.exe
              bcdedit.exe /set testsigning on
              3⤵
              • Modifies boot configuration data using bcdedit
              PID:2720
            • C:\Windows\SysWOW64\msiexec.exe
              msiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\QualcommWindowsDriverInstaller.msi" REBOOTNEEDED=1
              3⤵
              • Enumerates connected drives
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              PID:2780
        • C:\Windows\system32\Dwm.exe
          "C:\Windows\system32\Dwm.exe"
          1⤵
            PID:1212
          • C:\Windows\system32\taskhost.exe
            "taskhost.exe"
            1⤵
              PID:1168
            • C:\Windows\system32\msiexec.exe
              C:\Windows\system32\msiexec.exe /V
              1⤵
              • Enumerates connected drives
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2760
              • C:\Windows\syswow64\MsiExec.exe
                C:\Windows\syswow64\MsiExec.exe -Embedding A703A818D9C0158E9FD7549959B25D27 C
                2⤵
                • Loads dropped DLL
                • Suspicious use of WriteProcessMemory
                PID:2444
                • C:\Users\Admin\AppData\Local\Temp\{E8E2C614-1B64-4957-9733-119C8C9E0E60}\ISBEW64.exe
                  C:\Users\Admin\AppData\Local\Temp\{E8E2C614-1B64-4957-9733-119C8C9E0E60}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{4FF56655-1141-4AA4-BCF3-D335E1B0C3B4}
                  3⤵
                  • Executes dropped EXE
                  PID:2920
                • C:\Users\Admin\AppData\Local\Temp\{E8E2C614-1B64-4957-9733-119C8C9E0E60}\ISBEW64.exe
                  C:\Users\Admin\AppData\Local\Temp\{E8E2C614-1B64-4957-9733-119C8C9E0E60}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{32DDE7A7-A6B7-4BF9-87D7-441BAE94BA8E}
                  3⤵
                  • Executes dropped EXE
                  PID:2900
                • C:\Users\Admin\AppData\Local\Temp\{E8E2C614-1B64-4957-9733-119C8C9E0E60}\ISBEW64.exe
                  C:\Users\Admin\AppData\Local\Temp\{E8E2C614-1B64-4957-9733-119C8C9E0E60}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{933F591B-ADBC-4EA4-AFB6-E0678EA791F7}
                  3⤵
                  • Executes dropped EXE
                  PID:2888
                • C:\Users\Admin\AppData\Local\Temp\{E8E2C614-1B64-4957-9733-119C8C9E0E60}\ISBEW64.exe
                  C:\Users\Admin\AppData\Local\Temp\{E8E2C614-1B64-4957-9733-119C8C9E0E60}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{0F06AE8F-1F09-46BD-AB7E-0A7152C6B801}
                  3⤵
                  • Executes dropped EXE
                  PID:596
                • C:\Users\Admin\AppData\Local\Temp\{E8E2C614-1B64-4957-9733-119C8C9E0E60}\ISBEW64.exe
                  C:\Users\Admin\AppData\Local\Temp\{E8E2C614-1B64-4957-9733-119C8C9E0E60}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{EF61CA2A-C692-4D81-A89A-641AA4AA26B1}
                  3⤵
                  • Executes dropped EXE
                  PID:884
                • C:\Users\Admin\AppData\Local\Temp\{E8E2C614-1B64-4957-9733-119C8C9E0E60}\ISBEW64.exe
                  C:\Users\Admin\AppData\Local\Temp\{E8E2C614-1B64-4957-9733-119C8C9E0E60}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{287E2869-E02B-4A4B-AEEA-3E38C3E3A878}
                  3⤵
                  • Executes dropped EXE
                  PID:2272
                • C:\Users\Admin\AppData\Local\Temp\{E8E2C614-1B64-4957-9733-119C8C9E0E60}\ISBEW64.exe
                  C:\Users\Admin\AppData\Local\Temp\{E8E2C614-1B64-4957-9733-119C8C9E0E60}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{BC279C56-E346-4DC0-925F-BA748871753A}
                  3⤵
                  • Executes dropped EXE
                  PID:1652
                • C:\Users\Admin\AppData\Local\Temp\{E8E2C614-1B64-4957-9733-119C8C9E0E60}\ISBEW64.exe
                  C:\Users\Admin\AppData\Local\Temp\{E8E2C614-1B64-4957-9733-119C8C9E0E60}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{2C2DF120-BF5B-4C5F-AC45-B1E1E0ACF955}
                  3⤵
                  • Executes dropped EXE
                  PID:2328
                • C:\Users\Admin\AppData\Local\Temp\{E8E2C614-1B64-4957-9733-119C8C9E0E60}\ISBEW64.exe
                  C:\Users\Admin\AppData\Local\Temp\{E8E2C614-1B64-4957-9733-119C8C9E0E60}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{DC907BD5-8195-4F51-A13F-A3DFBADF3634}
                  3⤵
                  • Executes dropped EXE
                  PID:1848
                • C:\Users\Admin\AppData\Local\Temp\{E8E2C614-1B64-4957-9733-119C8C9E0E60}\ISBEW64.exe
                  C:\Users\Admin\AppData\Local\Temp\{E8E2C614-1B64-4957-9733-119C8C9E0E60}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{60CD6424-6DBE-4A13-9972-3892D2547A08}
                  3⤵
                  • Executes dropped EXE
                  PID:2220
                • C:\Users\Admin\AppData\Local\Temp\{E8E2C614-1B64-4957-9733-119C8C9E0E60}\ISBEW64.exe
                  C:\Users\Admin\AppData\Local\Temp\{E8E2C614-1B64-4957-9733-119C8C9E0E60}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{6C370785-7BBE-4A0D-BC8C-D53964B0C4DD}
                  3⤵
                  • Executes dropped EXE
                  PID:3044

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\MSI59C4.tmp

              Filesize

              1.3MB

              MD5

              7a2798d06f6ff4bb08381e75e1202277

              SHA1

              123875bd02231d8e06d234e400f64ebb6ce622f2

              SHA256

              c73541a041134a4e9d7e9e5f68aef83fa3f6caad9e9b44b7cba52cd5441a38de

              SHA512

              16784c47c85b5c446422d6c17c933fbe1bd0b4f02bf43d487b404180c2b53567e587c527b5c4b23c4af96780499e01e5871fb67ccbf83d5ed90df433f15a120a

            • C:\Users\Admin\AppData\Local\Temp\QualcommWindowsDriverInstaller.msi

              Filesize

              1.5MB

              MD5

              1cf9c8dc06df7bd624be890df45dc73d

              SHA1

              55de817e96228e57b432c86d3c1248683bb7348b

              SHA256

              c8a99d6a5a60214a19efac93d474930f9272aa95ebd5f1a7f65b3a3a153065b5

              SHA512

              ca8995a12aea0f760090f1c524cd0feb1a47ba6448f5915de8092ae1dd54e2585f2a8f0303d96ab3b66bf2927703ffcdf9e446b739b4dc9b49215c44c0b6b323

            • C:\Users\Admin\AppData\Local\Temp\usb3B6B.tmp

              Filesize

              1KB

              MD5

              9ec73e6eac0f766a7b1e84ac38560131

              SHA1

              46e3bce6931e4ca1efd80504709a5a039a0c5d20

              SHA256

              7d980f639dd6c0445543fae496fa72c378ba94f1e4a7e9e3f005a18bc36f6aa0

              SHA512

              068761dc100a0727aca24f6136d9e80ad35902e915e87085fe5093d30acea2df9a9141c3c39c339ca1ad91331295cf9d80f9533deaa45704a70762ce3335225e

            • C:\Users\Admin\AppData\Local\Temp\{E8E2C614-1B64-4957-9733-119C8C9E0E60}\ISBEW64.exe

              Filesize

              146KB

              MD5

              c3b2acc07bb0610405fc786e3432bef9

              SHA1

              333d5f2b55bd00ad4311ba104af7db984f953924

              SHA256

              9acc6cb5d01a4e4dbc92c8774c6999fab5f0e49f097e83098ba740842f5a2894

              SHA512

              2438e5dd11c8322101d9dc2d0f89ed0b1fc3cb5a65f644a1cf07f4c5a7f353c648e715fb910e09a444b623b3384eecd628e312608bcec63aa3b0107630df32bd

            • C:\njqhwc.exe

              Filesize

              100KB

              MD5

              13e1072e0a603e3d03fb5a69868042dc

              SHA1

              5010638675f237f9c65226e33fcbaafd378c483d

              SHA256

              133d30895323c4f2447494321d288fb79a1509e269aba77974064ec44cf6fc98

              SHA512

              943cefb2e68c6bad996991176f38de3c171b12fdbda512e87ffca7ebbcea270c17390844f2240c2cd7e02dceb8ab297a402bcf01c7faed135679fb59e216bdab

            • \Users\Admin\AppData\Local\Temp\MSI59C4.tmp

              Filesize

              1.1MB

              MD5

              bb8ff9fc0334d623cd165d96934d4712

              SHA1

              b0a2f67729e88af74feb5813b8937769322720e9

              SHA256

              1b632b06b8fdd89aaa9ed534a685338d6de8e98c90c409ef4d7bf344676e56d8

              SHA512

              e02961d885a45d5d2a45af9cb3bbd20e2f416cd9c6a03cfc15d04e2338ee8ab524dfa24fb8235210901fe0af2b1a1239ee85e39c1d60f4575d6876b0167f8cc7

            • \Users\Admin\AppData\Local\Temp\{E8E2C614-1B64-4957-9733-119C8C9E0E60}\ISRT.dll

              Filesize

              260KB

              MD5

              a93f625ef42b54c2b0f4d38201e67606

              SHA1

              cbfebc1f736ccfc65562ede79a5ae1a8afb116a1

              SHA256

              e91a865c3d60d9d0bce5d5a0a2f551c5e032d5bc13bc40f85091ce46d38064e0

              SHA512

              805f0d535022de3d03aa191239fd90c54f2f6745bf02e0ce9cbe59ea34eecac7f9ebb600864c7cbcad5d011fa61bdb5b65889136617edc44178f87bd3970b198

            • \Users\Admin\AppData\Local\Temp\{E8E2C614-1B64-4957-9733-119C8C9E0E60}\_isres_0x0409.dll

              Filesize

              540KB

              MD5

              d6bbf7ff6984213c7f1f0f8f07c51e6a

              SHA1

              cfe933fc3b634f7333adec7ec124c14e9d19ac21

              SHA256

              6366e18a8cbf609c9573f341004e5c2725c23a12973affa90ee7bcc7934ae1b2

              SHA512

              a1364c96848f54b241c8e92ed1887ca599255c8046e31af11cd4b0b23d97c00243808dff9086a536c0084d6815223685283844a9e27f2c20c4d3b85a794a9e9d

            • memory/1168-9-0x0000000000350000-0x0000000000352000-memory.dmp

              Filesize

              8KB

            • memory/2444-76-0x00000000029C0000-0x0000000002A67000-memory.dmp

              Filesize

              668KB

            • memory/2444-77-0x0000000000210000-0x0000000000212000-memory.dmp

              Filesize

              8KB

            • memory/2444-75-0x0000000010000000-0x00000000101B5000-memory.dmp

              Filesize

              1.7MB

            • memory/2444-82-0x00000000028E0000-0x0000000002969000-memory.dmp

              Filesize

              548KB

            • memory/2444-114-0x00000000029C0000-0x0000000002A67000-memory.dmp

              Filesize

              668KB

            • memory/2444-35-0x00000000001A0000-0x00000000001A2000-memory.dmp

              Filesize

              8KB

            • memory/2444-34-0x0000000010000000-0x00000000101B5000-memory.dmp

              Filesize

              1.7MB

            • memory/2444-113-0x0000000010000000-0x00000000101B5000-memory.dmp

              Filesize

              1.7MB

            • memory/2516-23-0x0000000002BC0000-0x0000000003C4E000-memory.dmp

              Filesize

              16.6MB

            • memory/2516-19-0x00000000002D0000-0x00000000002D2000-memory.dmp

              Filesize

              8KB

            • memory/2516-27-0x0000000002BC0000-0x0000000003C4E000-memory.dmp

              Filesize

              16.6MB

            • memory/2516-26-0x0000000002BC0000-0x0000000003C4E000-memory.dmp

              Filesize

              16.6MB

            • memory/2516-25-0x0000000002BC0000-0x0000000003C4E000-memory.dmp

              Filesize

              16.6MB

            • memory/2516-24-0x0000000002BC0000-0x0000000003C4E000-memory.dmp

              Filesize

              16.6MB

            • memory/2516-36-0x0000000002BC0000-0x0000000003C4E000-memory.dmp

              Filesize

              16.6MB

            • memory/2516-39-0x0000000002BC0000-0x0000000003C4E000-memory.dmp

              Filesize

              16.6MB

            • memory/2516-40-0x0000000002BC0000-0x0000000003C4E000-memory.dmp

              Filesize

              16.6MB

            • memory/2516-46-0x0000000002BC0000-0x0000000003C4E000-memory.dmp

              Filesize

              16.6MB

            • memory/2516-48-0x0000000002BC0000-0x0000000003C4E000-memory.dmp

              Filesize

              16.6MB

            • memory/2516-1-0x0000000000400000-0x0000000001126000-memory.dmp

              Filesize

              13.1MB

            • memory/2516-58-0x0000000002BC0000-0x0000000003C4E000-memory.dmp

              Filesize

              16.6MB

            • memory/2516-60-0x0000000002BC0000-0x0000000003C4E000-memory.dmp

              Filesize

              16.6MB

            • memory/2516-64-0x0000000002BC0000-0x0000000003C4E000-memory.dmp

              Filesize

              16.6MB

            • memory/2516-65-0x0000000002BC0000-0x0000000003C4E000-memory.dmp

              Filesize

              16.6MB

            • memory/2516-66-0x0000000002BC0000-0x0000000003C4E000-memory.dmp

              Filesize

              16.6MB

            • memory/2516-22-0x0000000002BC0000-0x0000000003C4E000-memory.dmp

              Filesize

              16.6MB

            • memory/2516-20-0x0000000002BC0000-0x0000000003C4E000-memory.dmp

              Filesize

              16.6MB

            • memory/2516-28-0x0000000002BC0000-0x0000000003C4E000-memory.dmp

              Filesize

              16.6MB

            • memory/2516-17-0x0000000002BC0000-0x0000000003C4E000-memory.dmp

              Filesize

              16.6MB

            • memory/2516-78-0x0000000002BC0000-0x0000000003C4E000-memory.dmp

              Filesize

              16.6MB

            • memory/2516-14-0x0000000002BC0000-0x0000000003C4E000-memory.dmp

              Filesize

              16.6MB

            • memory/2516-11-0x0000000002BC0000-0x0000000003C4E000-memory.dmp

              Filesize

              16.6MB

            • memory/2516-98-0x0000000002BC0000-0x0000000003C4E000-memory.dmp

              Filesize

              16.6MB

            • memory/2516-99-0x0000000002BC0000-0x0000000003C4E000-memory.dmp

              Filesize

              16.6MB

            • memory/2516-100-0x0000000002BC0000-0x0000000003C4E000-memory.dmp

              Filesize

              16.6MB

            • memory/2516-102-0x0000000002BC0000-0x0000000003C4E000-memory.dmp

              Filesize

              16.6MB

            • memory/2516-104-0x0000000002BC0000-0x0000000003C4E000-memory.dmp

              Filesize

              16.6MB

            • memory/2516-111-0x0000000002BC0000-0x0000000003C4E000-memory.dmp

              Filesize

              16.6MB

            • memory/2516-8-0x0000000002BC0000-0x0000000003C4E000-memory.dmp

              Filesize

              16.6MB

            • memory/2516-5-0x0000000002BC0000-0x0000000003C4E000-memory.dmp

              Filesize

              16.6MB

            • memory/2516-115-0x0000000002BC0000-0x0000000003C4E000-memory.dmp

              Filesize

              16.6MB

            • memory/2516-117-0x0000000002BC0000-0x0000000003C4E000-memory.dmp

              Filesize

              16.6MB

            • memory/2516-119-0x0000000002BC0000-0x0000000003C4E000-memory.dmp

              Filesize

              16.6MB

            • memory/2516-122-0x0000000002BC0000-0x0000000003C4E000-memory.dmp

              Filesize

              16.6MB

            • memory/2516-133-0x0000000002BC0000-0x0000000003C4E000-memory.dmp

              Filesize

              16.6MB

            • memory/2516-3-0x0000000002BC0000-0x0000000003C4E000-memory.dmp

              Filesize

              16.6MB