Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08/03/2024, 11:34

General

  • Target

    2024-03-08_c75207ac92d4f3c71727a2c92a9a88e0_icedid.exe

  • Size

    2.7MB

  • MD5

    c75207ac92d4f3c71727a2c92a9a88e0

  • SHA1

    373c12f99d79fe45a98602ce53378790d3b64be2

  • SHA256

    675b869b53bf9affa38856ca7d25acdcab20d4f2d7b7f6001c06abf92c180b1e

  • SHA512

    57ff28f7586ac3dbbe8c5135e60ebe504b5bd7f8f8aae5fe31b975bd0ece17539ba80194031d64348681430320de9afc6992e7991466d74dca511fe5d91d14da

  • SSDEEP

    49152:rGgaUR27czKMf1bTChxKCnFnQXBbrtgb/iQvu0UHOc2i:PR716hxvWbrtUTrUHOA

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 11 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-08_c75207ac92d4f3c71727a2c92a9a88e0_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-08_c75207ac92d4f3c71727a2c92a9a88e0_icedid.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Windows\SysWOW64\explorer.exe
      explorer.exe
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1968
      • C:\Users\Admin\AppData\Local\Temp\@AE52B2.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\@AE52B2.tmp.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2980
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin0.bat" "
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2400
          • C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1468
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat" "
              6⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1944
              • C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe" /i 1468
                7⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:2128
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin2.bat" "
                  8⤵
                  • Loads dropped DLL
                  • Suspicious use of WriteProcessMemory
                  PID:1440
                  • C:\Users\Admin\AppData\Local\Temp\wtmps.exe
                    "C:\Users\Admin\AppData\Local\Temp\wtmps.exe"
                    9⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Suspicious use of WriteProcessMemory
                    PID:864
                    • C:\Windows\SysWOW64\mscaps.exe
                      "C:\Windows\system32\mscaps.exe" /C:\Users\Admin\AppData\Local\Temp\wtmps.exe
                      10⤵
                      • Executes dropped EXE
                      PID:1976
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat" "
          4⤵
            PID:1324
        • C:\Users\Admin\AppData\Local\Temp\2024-03-08_c75207ac92d4f3c71727a2c92a9a88e0_icedid.exe
          "C:\Users\Admin\AppData\Local\Temp\2024-03-08_c75207ac92d4f3c71727a2c92a9a88e0_icedid.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:2452

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\2024-03-08_c75207ac92d4f3c71727a2c92a9a88e0_icedid.exe

            Filesize

            981KB

            MD5

            d85eb2dcd6f35972bba6db2bb9d8c24d

            SHA1

            7ac3aaa02cdab88ead65a13ceec1fd22fe6c20b9

            SHA256

            583c9d3bf4adac2a2637549f7987b3ca9fd02ac814f73571ba14a554e088254b

            SHA512

            68945e29333922df5e40be601a7d5a9f6f6b70343cf2eb3db337a0ea5a74f0757017b13ff78c5a050dd2f6a086dfc814b9a33339a7d1dac37ee80d7fd9c26a3e

          • C:\Users\Admin\AppData\Local\Temp\6AC4.tmp

            Filesize

            406B

            MD5

            37512bcc96b2c0c0cf0ad1ed8cfae5cd

            SHA1

            edf7f17ce28e1c4c82207cab8ca77f2056ea545c

            SHA256

            27e678bf5dc82219d6edd744f0b82567a26e40f8a9dcd6487205e13058e3ed1f

            SHA512

            6d4252ab5aa441a76ce2127224fefcb221259ab4d39f06437b269bd6bfdaae009c8f34e9603ec734159553bc9f1359bdd70316cd426d73b171a9f17c41077641

          • C:\Users\Admin\AppData\Local\Temp\@AE52B2.tmp.exe

            Filesize

            1.7MB

            MD5

            7dc03a754926501d4b6ad38a7d34c538

            SHA1

            a088abb2c516b7d74643ae8e015514fae03651ce

            SHA256

            66d53b37cfc5131947a3ff1ae480cdddfbe1c3892b1956588262bc460a5ecfc9

            SHA512

            9ae9519c106f670582aa1e39e1cfb78bb9b315b899a8c2d9e523035f721e9a8b72a447289e71243a5e01398eb7e5d4611f46641c06b72c5292ec0d165b6747f8

          • C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe

            Filesize

            172KB

            MD5

            daac1781c9d22f5743ade0cb41feaebf

            SHA1

            e2549eeeea42a6892b89d354498fcaa8ffd9cac4

            SHA256

            6a7093440420306cf7de53421a67af8a1094771e0aab9535acbd748d08ed766c

            SHA512

            190a7d5291e20002f996edf1e04456bfdff8b7b2f4ef113178bd42a9e5fd89fe6d410ae2c505de0358c4f53f9654ac1caaa8634665afa6d9691640dd4ee86160

          • C:\Users\Admin\AppData\Roaming\Temp\Admin0.bat

            Filesize

            129B

            MD5

            d1073c9b34d1bbd570928734aacff6a5

            SHA1

            78714e24e88d50e0da8da9d303bec65b2ee6d903

            SHA256

            b3c704b1a728004fc5e25899d72930a7466d7628dd6ddd795b3000897dfa4020

            SHA512

            4f2b9330e30fcc55245dc5d12311e105b2b2b9d607fbfc4a203c69a740006f0af58d6a01e2da284575a897528da71a2e61a7321034755b78feb646c8dd12347f

          • C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat

            Filesize

            126B

            MD5

            44ec53ef04a5c5cc0f0769549d394cc2

            SHA1

            5a8c7f4aeaa8d53ecdaa511523a8536a41995d56

            SHA256

            1c88245f08b16b5fa35ef686b59cb9c65a2d1dab71d1d40fed72ad962b5346d2

            SHA512

            813031b5a8ddc79eefba4cf3cf23b286cfd1d49b0f5932f1317f54148b7994b8fa59a5cc61cb1574db852702ce33cf49fabd5e9a987dc660a1f9a84f5833ee4d

          • C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat

            Filesize

            196B

            MD5

            b0e83be0abe36f48026043bd8428faa9

            SHA1

            1d16e4a1faf9309154405f8bab396547b25cff57

            SHA256

            1c3b1f27de7af408129dec39192627c6477f10eb47824d11c668ce515ce1eb57

            SHA512

            b1f445c87c80d459e0b55c56aeff57dcf65c8fd28ec92b889c07cf0b4fa48525e1a46e76040f9f509c9c1752d2f0e126b044368fe971b68ce5780af8f8e1d7a9

          • C:\Users\Admin\AppData\Roaming\Temp\Admin2.bat

            Filesize

            102B

            MD5

            3ca08f080a7a28416774d80552d4aa08

            SHA1

            0b5f0ba641204b27adac4140fd45dce4390dbf24

            SHA256

            4e7d460b8dc9f2c01b4c5a16fb956aced10127bc940e8039a80c6455901ea1f0

            SHA512

            0c64aa462ff70473ef763ec392296fe0ea59b5340c26978531a416732bc3845adf9ca7b673cb7b4ba40cc45674351206096995c43600fccbbbe64e51b6019f01

          • C:\Users\Admin\AppData\Roaming\Temp\mydll.dll

            Filesize

            202KB

            MD5

            684c111c78f8bf6fcb5575d400e7669c

            SHA1

            d587894c0beffdff00ae6d358a5463ef18bcb485

            SHA256

            080fb4cd0b92884c89efab9161685f3ba0666cd9dab8de6c752bfe35e4e45716

            SHA512

            bcf748d21be502d7346f56ffc9ef13f3394d46c679d7cf17289d007e91b4ead2ec4035b3ccd5626eb378958cbb6ac371edfde8319433db9b709694595ae53e4f

          • C:\Windows\SysWOW64\mscaps.exe

            Filesize

            200KB

            MD5

            78d3c8705f8baf7d34e6a6737d1cfa18

            SHA1

            9f09e248a29311dbeefae9d85937b13da042a010

            SHA256

            2c4c9ec8e9291ba5c73f641af2e0c3e1bbd257ac40d9fb9d3faab7cebc978905

            SHA512

            9a3c3175276da58f1bc8d1138e63238c8d8ccfbfa1a8a1338e88525eca47f8d745158bb34396b7c3f25e4296be5f45a71781da33ad0bbdf7ad88a9c305b85609

          • \Users\Admin\AppData\Local\Temp\wtmps.exe

            Filesize

            276KB

            MD5

            75c1467042b38332d1ea0298f29fb592

            SHA1

            f92ea770c2ddb04cf0d20914578e4c482328f0f8

            SHA256

            3b20c853d4ca23240cd338b8cab16f1027c540ddfe9c4ffdca1624d2f923b373

            SHA512

            5c47c59ad222e2597ccdf2c100853c48f022e933f44c279154346eacf9e7e6f54214ada541d43a10424035f160b56131aab206c11512a9fd6ea614fbd3160aa0

          • \Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe

            Filesize

            1.7MB

            MD5

            3355ab4660ecd53478eb45d67d4ffc16

            SHA1

            6a1e99dbcd837833f521c227620e930d34ee0f75

            SHA256

            54da87805a9288ab45da0444e779fdc7027b84de05cc38262d6e84469fc571d8

            SHA512

            f27e2fab2e96d2bd06e22d842b7791fb5d9af6daf1d52c820e0e7cd828bc630e51eb98fe7778ab980a4384931f5aae443c37854e12d80351334d3bb3f4592457

          • \Users\Admin\AppData\Roaming\Temp\mydll.dll

            Filesize

            202KB

            MD5

            7ff15a4f092cd4a96055ba69f903e3e9

            SHA1

            a3d338a38c2b92f95129814973f59446668402a8

            SHA256

            1b594e6d057c632abb3a8cf838157369024bd6b9f515ca8e774b22fe71a11627

            SHA512

            4b015d011c14c7e10568c09bf81894681535efb7d76c3ef9071fffb3837f62b36e695187b2d32581a30f07e79971054e231a2ca4e8ad7f0f83d5876f8c086dae

          • memory/2128-313-0x0000000010000000-0x0000000010015000-memory.dmp

            Filesize

            84KB

          • memory/2980-17-0x0000000010000000-0x0000000010015000-memory.dmp

            Filesize

            84KB