Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 06:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-09_16d0e74a32f973c2e9b13c8e7736c5f5_icedid.exe
Resource
win7-20240221-en
General
-
Target
2024-03-09_16d0e74a32f973c2e9b13c8e7736c5f5_icedid.exe
-
Size
3.1MB
-
MD5
16d0e74a32f973c2e9b13c8e7736c5f5
-
SHA1
840913164d709d5e31a509571c6fcc185d6e1740
-
SHA256
697ed9f1fe678a7861cce39407289d6ab2c818716a46c552430cde9b7028e770
-
SHA512
5671b0eeb3198edb9082ef0d6cc88bf276475357d849086722548a06d6a527a7c69cc6d0e84b37c45c6a4b185e5c5c8f9a7cb6896bb91eabceba7403bfc5091a
-
SSDEEP
49152:dw7cq43rhAmZLPYf4kpUJWDQ7cSwMuIdhgT/g9cRw9QrtWOs6Q:4KLQfHuV7nwdWciqrEr
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 480 Process not Found 2716 alg.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe 2024-03-09_16d0e74a32f973c2e9b13c8e7736c5f5_icedid.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\Adobe\caps\caps.db 2024-03-09_16d0e74a32f973c2e9b13c8e7736c5f5_icedid.exe File created C:\Program Files (x86)\Common Files\Adobe\caps\caps.db-journal 2024-03-09_16d0e74a32f973c2e9b13c8e7736c5f5_icedid.exe File created C:\Program Files (x86)\Common Files\Adobe\backup\caps.db 2024-03-09_16d0e74a32f973c2e9b13c8e7736c5f5_icedid.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\backup\caps.db 2024-03-09_16d0e74a32f973c2e9b13c8e7736c5f5_icedid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2220 2024-03-09_16d0e74a32f973c2e9b13c8e7736c5f5_icedid.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2220 2024-03-09_16d0e74a32f973c2e9b13c8e7736c5f5_icedid.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-09_16d0e74a32f973c2e9b13c8e7736c5f5_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-09_16d0e74a32f973c2e9b13c8e7736c5f5_icedid.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2220
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
PID:2716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD586ed2df96dcfb1488db4d98c46ce210c
SHA195fda3ccda536ef57de36d662d9db5e532007d9d
SHA2568e26ca94cda14cc783621680daf9f14927c3cef4626a83c2f06b8076727ba965
SHA51232a3681d564ac336a026d2fbc421f48b803b68f41dbe633d80797faf8404375a7bdaaf31fabc8bfc984f0c189f660a16a148bc172c0d71001434a292abb450bb
-
Filesize
644KB
MD5e715755ebdb9dab440b03d12d1a54529
SHA1d5985cc167243a2728509d07ac98b45d958c61b5
SHA256c1e871470ea28f043b5de5efb74ccda78b8fce907f3babe285461729b38e02e1
SHA512523e01351ab9e702dc75c32c788d769ced73e1b64a7c8ebb62a347b8a8baae26e79001ab157087f9a8b1ba24fd2515292870b8f4bbe959fafb9248e4d0377770