Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/02/2024, 20:07
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-21_f9a2461635a8c9dd18336c654f046b78_icedid.exe
Resource
win7-20240221-en
General
-
Target
2024-02-21_f9a2461635a8c9dd18336c654f046b78_icedid.exe
-
Size
284KB
-
MD5
f9a2461635a8c9dd18336c654f046b78
-
SHA1
5c1d3611eb4857b96cce1d1fb848b428e9e474cd
-
SHA256
ac5bfa43c597296edf50645e43a953d09522f1e3aefde76a11482e4ebce18857
-
SHA512
d135cda06779135fc941623bb97a446220f69ed261e6343161164e52e0e5b47df3d962bebfff57df69c86df6a513a85c7a2a3e6e2f0538751a1d3e9fff5f5a9c
-
SSDEEP
6144:jlDx7mlcAZBcIdqkorDfoR/0C1fzDB9ePHSJ:jlDx7mlHZo7HoRv177ePH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1596 sethome581.exe -
Loads dropped DLL 2 IoCs
pid Process 2112 2024-02-21_f9a2461635a8c9dd18336c654f046b78_icedid.exe 2112 2024-02-21_f9a2461635a8c9dd18336c654f046b78_icedid.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created \??\c:\windows\system\sethome581.exe 2024-02-21_f9a2461635a8c9dd18336c654f046b78_icedid.exe File opened for modification \??\c:\windows\system\sethome581.exe 2024-02-21_f9a2461635a8c9dd18336c654f046b78_icedid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.baiduo.org/" 2024-02-21_f9a2461635a8c9dd18336c654f046b78_icedid.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2112 2024-02-21_f9a2461635a8c9dd18336c654f046b78_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2112 2024-02-21_f9a2461635a8c9dd18336c654f046b78_icedid.exe 2112 2024-02-21_f9a2461635a8c9dd18336c654f046b78_icedid.exe 2112 2024-02-21_f9a2461635a8c9dd18336c654f046b78_icedid.exe 2112 2024-02-21_f9a2461635a8c9dd18336c654f046b78_icedid.exe 1596 sethome581.exe 1596 sethome581.exe 1596 sethome581.exe 1596 sethome581.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 1596 2112 2024-02-21_f9a2461635a8c9dd18336c654f046b78_icedid.exe 33 PID 2112 wrote to memory of 1596 2112 2024-02-21_f9a2461635a8c9dd18336c654f046b78_icedid.exe 33 PID 2112 wrote to memory of 1596 2112 2024-02-21_f9a2461635a8c9dd18336c654f046b78_icedid.exe 33 PID 2112 wrote to memory of 1596 2112 2024-02-21_f9a2461635a8c9dd18336c654f046b78_icedid.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-21_f9a2461635a8c9dd18336c654f046b78_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-21_f9a2461635a8c9dd18336c654f046b78_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
\??\c:\windows\system\sethome581.exec:\windows\system\sethome581.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1596
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
965B
MD5470c90674fefd449bbd566dc219bb12c
SHA1ed6bf4ba6bd3afc32683ef5834fe337118ab8b3b
SHA2567d86c5c7290730d016b6b196e5ccbe1b93a8839f6f61911345b22c3c0828554e
SHA512affb0be3d2422a660d4a6a86e076632df313387ca24c0f0168ea644999e134f440c28b66c3f0b7c6e93f52750c0a86aaeb9d069f2c495cf97cbcd960826f8c5e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Internet Explorer (No Add-ons).lnk
Filesize1KB
MD528bc852174635c1177fcb3b49d7d1f16
SHA1ad4482730dd2583acac572e02119aa5424c12f17
SHA25620afc74913b099cdf7aab4c2d216134a290e7a65886f9a783f67fae6b929f317
SHA512398f8e4a0643d3d578466a2ffaf5a6c7707cc734dd0819b05b31fcb34d14269cd4cbb758b7e29a99a250bc1b5bf9404df25a0f0bb27e2193c69620c1cee6e12b
-
Filesize
1KB
MD5a1dc5e64fd9240773402bf2481e25ccf
SHA1da531501f138a8dbf4ffd619508e19ffe517cf7d
SHA2565a2df053995d0ae68a0eab5f99858895a1be291702c817284b954af6f40e040f
SHA51252e55482914b513fc41c198def5444a3eb82b61aac0c167aa58f475bdf122827ea735d50553c0f273bd081cbf52c61d415f95df6bd970f2f8ead0d4e541b80fa
-
Filesize
284KB
MD5e011c825f0e6ec85fd5f357ad7fbf867
SHA16b162747f43fe1fd85e536fdbbfc8a74c093bf9c
SHA256e42dacae5dc21095f46b1170a4a0297d42eee0b1010cd16b83afbbe5f8e2cace
SHA5120b4aa8cb32f75bace40e57e904b8b35d081881a80c3298d45a697b4308e2371f4f02cd77944dc7b822f35e35495119944ac5913eecc5bcbb6dd0aef88b708ff0