Analysis

  • max time kernel
    150s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/03/2024, 15:51

General

  • Target

    2024-03-11_b00803d786570487ed283bafd7ad7550_icedid.exe

  • Size

    4.0MB

  • MD5

    b00803d786570487ed283bafd7ad7550

  • SHA1

    978bd4d20989516d6d54d44437c82551909e7a93

  • SHA256

    d1194b88997b4bf9aded2febf56432514c675314442cfd119573da00e8477e7d

  • SHA512

    4235ad434f5fd3df1b0c9e48d15c0bf8edc07b28646dc1d0e9cc2ced54bb8056039912ff0f624c76ac46ff8cf44a34c2f2a159aaf5fc526dfd99bc57b4d61cba

  • SSDEEP

    98304:81ZjPBp6mvIdR5fmBsTnzixI8aho6xoAdpXybDZh3Pe/R6hxvWbrtUTrUHOZ:E+5ZnXh12AdpXybDZh3Pe/Ux+NcIOZ

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-11_b00803d786570487ed283bafd7ad7550_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-11_b00803d786570487ed283bafd7ad7550_icedid.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2768
    • C:\Windows\SysWOW64\explorer.exe
      explorer.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4952
      • C:\Users\Admin\AppData\Local\Temp\@AE607F.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\@AE607F.tmp.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2528
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin0.bat" "
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3008
          • C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4752
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat" "
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2248
              • C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe" /i 4752
                7⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:2708
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin2.bat" "
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3648
                  • C:\Users\Admin\AppData\Local\Temp\wtmps.exe
                    "C:\Users\Admin\AppData\Local\Temp\wtmps.exe"
                    9⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Suspicious use of WriteProcessMemory
                    PID:2388
                    • C:\Windows\SysWOW64\mscaps.exe
                      "C:\Windows\system32\mscaps.exe" /C:\Users\Admin\AppData\Local\Temp\wtmps.exe
                      10⤵
                      • Executes dropped EXE
                      PID:3512
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat" "
          4⤵
            PID:2864
        • C:\Users\Admin\AppData\Local\Temp\2024-03-11_b00803d786570487ed283bafd7ad7550_icedid.exe
          "C:\Users\Admin\AppData\Local\Temp\2024-03-11_b00803d786570487ed283bafd7ad7550_icedid.exe"
          3⤵
          • Executes dropped EXE
          PID:1224

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\2024-03-11_b00803d786570487ed283bafd7ad7550_icedid.exe

            Filesize

            1.5MB

            MD5

            d474825c0654d3e2ccfc9c7de916f01e

            SHA1

            c88b9bb04646e734fd02192a3941a976c53787a1

            SHA256

            012817a4ec4292e27542f51068fde290593da804e87a94f80060170b6c90b1cb

            SHA512

            dc422fbe46a6254d26f2f7cd67c35624484020425e1a6d6a7f42b2e5e0709318c51b8053f41dbdfcb5ca00cdd2b31865b4415a4f9001a737496fdd846890fbb7

          • C:\Users\Admin\AppData\Local\Temp\2024-03-11_b00803d786570487ed283bafd7ad7550_icedid.exe

            Filesize

            1.1MB

            MD5

            bb98ca3ee1f8959a6f29bee4c3971ce9

            SHA1

            84e03f31de946da659ceee41d52f2743136a47f9

            SHA256

            dfc7844d67e1266814580b67a70b42c334c3538582eb2c58db3681ccbfe5bd44

            SHA512

            3a28eae3990666be4871b8101333792ba7286ca79c59671e7c1c389c8eaab28d97a861275a8e6f0ecc43c5308e8edf996169e839a1d695159d1671f07ad7afda

          • C:\Users\Admin\AppData\Local\Temp\7C83.tmp

            Filesize

            406B

            MD5

            37512bcc96b2c0c0cf0ad1ed8cfae5cd

            SHA1

            edf7f17ce28e1c4c82207cab8ca77f2056ea545c

            SHA256

            27e678bf5dc82219d6edd744f0b82567a26e40f8a9dcd6487205e13058e3ed1f

            SHA512

            6d4252ab5aa441a76ce2127224fefcb221259ab4d39f06437b269bd6bfdaae009c8f34e9603ec734159553bc9f1359bdd70316cd426d73b171a9f17c41077641

          • C:\Users\Admin\AppData\Local\Temp\@AE607F.tmp.exe

            Filesize

            1.1MB

            MD5

            9fd3fcce7db129ed4bec4a4588512a27

            SHA1

            012352f411f068927afed0e8d202ac96c77c3f48

            SHA256

            85e96428e19ff3ab7b20ec7e64ee2c461e358fd39458acf86b25500f177cf92b

            SHA512

            5d485a24306ae624078e82b211d4569b8ded747523bac4f2b0d54011b584038a774bbc266d9acfdd90e5dd2a9a1034baad22d90fac71cfe1bb4c0e8171d2f62e

          • C:\Users\Admin\AppData\Local\Temp\@AE607F.tmp.exe

            Filesize

            1.7MB

            MD5

            0fdc502969fb26a0e7b944c4b4e2b654

            SHA1

            dddf54dc786762d9bb72dff6e8a0f89622229be0

            SHA256

            cd7b8e7054def7b65436b15ca2f2cbfe6bcd121dbbfdb8e0ea1deb8fe641460d

            SHA512

            ee61d15c4806fd64764baec95209c71930bef28112205de78bfeab47c6e27deacc26f3adfec4fc20e22470ced5c310fefc3e362750bbeab391c91aa8c8513993

          • C:\Users\Admin\AppData\Local\Temp\tmp6F25.tmp

            Filesize

            1.0MB

            MD5

            09fb5503125289ff47fb22e116657214

            SHA1

            dfe2f43fecda79824a668d94449917e6fab9ecb8

            SHA256

            11a1383b8c058ef364839159441ff346e7828bf674acf5c58b8ff270b87481c3

            SHA512

            8cf9b68c8cbba8f7280fe3a50f645406d28fe9c38d7b4588351ed0390dd051333292fb58ad73f83b659ee0b3cf39559236ac3e6d71cf9edf697c7bd558e44863

          • C:\Users\Admin\AppData\Local\Temp\tmp6F55.tmp

            Filesize

            229KB

            MD5

            6f90e1169d19dfde14d6f753f06c862b

            SHA1

            e9bca93c68d7df73d000f4a6e6eb73a343682ac5

            SHA256

            70a392389aecd0f58251e72c3fd7e9159f481061d14209ff8708a0fd9ff584dc

            SHA512

            f0c898222e9578c01ebe1befac27a3fb68d8fb6e76c7d1dec7a8572c1aa3201bacf1e69aa63859e95606790cf09962bcf7dc33b770a6846bed5bd7ded957b0b3

          • C:\Users\Admin\AppData\Local\Temp\tmp6F56.tmp

            Filesize

            120KB

            MD5

            f558c76b0376af9273717fa24d99ebbf

            SHA1

            f84bcece5c6138b62ef94e9d668cf26178ee14cc

            SHA256

            01631353726dc51bcea311dbc012572cf96775e516b1c79a2de572ef15954b7a

            SHA512

            2092d1e126d0420fec5fc0311d6b99762506563f4890e4049e48e2d87dde5ac3e2e2ecc986ab305de2c6ceb619f18879a69a815d3241ccf8140bc5ea00c6768d

          • C:\Users\Admin\AppData\Local\Temp\tmp6F66.tmp

            Filesize

            126KB

            MD5

            02ae22335713a8f6d6adf80bf418202b

            SHA1

            4c40c11f43df761b92a5745f85a799db7b389215

            SHA256

            ae5697f849fa48db6d3d13455c224fcf6ceb0602a1e8ac443e211dd0f32d50f4

            SHA512

            727d16102bfc768535b52a37e4e7b5d894f5daa268d220df108382c36dcce063afdbc31fd495a7a61305263ec4cd7e92713d894faa35b585c0b379217a1d929c

          • C:\Users\Admin\AppData\Local\Temp\tmp6F77.tmp

            Filesize

            89KB

            MD5

            09203a9741b91f3a9ed01c82dcb8778d

            SHA1

            13e6f3fb169cd6aa5e4d450417a7e15665a2e140

            SHA256

            63149ad45db380f5dd15f65d9ceb2611d53a0a66e022483bee4ce2ff7d2610e2

            SHA512

            9e9e6fe0dd713417d0e28ba787cf862d55ecda9ee9f3df1eada144657f6a3b6ada1984fd05a3fffcd597a9715383225a8e40b6e5d0d8d39ec0d3a64b8dea9846

          • C:\Users\Admin\AppData\Local\Temp\tmp6F78.tmp

            Filesize

            99KB

            MD5

            9a27bfb55dd768ae81ca8716db2da343

            SHA1

            55da0f4282bd838f72f435a5d4d24ac15b04482b

            SHA256

            5ec8093ef5939d1abce1c576097b584fb600b94ad767c1da897f7cb7f0063d26

            SHA512

            d9bb49d2f282ed09c351a1d8eb2540781e6a7fb39265473fd59d146bfc162f27a4ab1405301ed7395c12929a80551a399437d7d794d7ac48650e9037b60eb69c

          • C:\Users\Admin\AppData\Local\Temp\tmp6F89.tmp

            Filesize

            172KB

            MD5

            2634fa3a332c297711cb59d43f54ffce

            SHA1

            8e2b68d0ee4e792efb1945ba86eceb87f07087d2

            SHA256

            27c945ccb84aa024f1f063701327e829a7ef3a7ede4a43b2febbb1dddbdf8740

            SHA512

            84e4799b9b18a7cc7be685c793a9b4fb135ea331d1d235fe823e1d7091130f131ab2fbad1da4dea795e82547aa16b00f4e2a9faaa96cb522d795f9abfda2fc53

          • C:\Users\Admin\AppData\Local\Temp\tmp6F8A.tmp

            Filesize

            276KB

            MD5

            e07c6a9e595f045fadc463dfda44ab16

            SHA1

            e6b199272ade02613f2003c365a4cb1487431e23

            SHA256

            d2fa6f9686386a92253a9c5ea25ace702a111483540b60c1300789235cea7fdc

            SHA512

            f3c630ae8381b99519aeeadbc2918810e7fb09a909f73ee6c46f4e9d3cf8c5051a5cf763db6a775d6cd8713ccf95a63b18df9ed756fa28276e8d7ab6a47f2cbf

          • C:\Users\Admin\AppData\Local\Temp\wtmps.exe

            Filesize

            276KB

            MD5

            75c1467042b38332d1ea0298f29fb592

            SHA1

            f92ea770c2ddb04cf0d20914578e4c482328f0f8

            SHA256

            3b20c853d4ca23240cd338b8cab16f1027c540ddfe9c4ffdca1624d2f923b373

            SHA512

            5c47c59ad222e2597ccdf2c100853c48f022e933f44c279154346eacf9e7e6f54214ada541d43a10424035f160b56131aab206c11512a9fd6ea614fbd3160aa0

          • C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe

            Filesize

            172KB

            MD5

            daac1781c9d22f5743ade0cb41feaebf

            SHA1

            e2549eeeea42a6892b89d354498fcaa8ffd9cac4

            SHA256

            6a7093440420306cf7de53421a67af8a1094771e0aab9535acbd748d08ed766c

            SHA512

            190a7d5291e20002f996edf1e04456bfdff8b7b2f4ef113178bd42a9e5fd89fe6d410ae2c505de0358c4f53f9654ac1caaa8634665afa6d9691640dd4ee86160

          • C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe

            Filesize

            1.5MB

            MD5

            e7259dda52529b76612d298f43075664

            SHA1

            2952515942ea4c0775bd9c6591fd07df0c0dcc9a

            SHA256

            bf51c9918fe5be16796d1011df1b703ab79d5d132ab309b8b5be6e75fff086b0

            SHA512

            9c2d5b5e13a5c6c9ab4684ebc9441dcf76edcde95783f45d6af2eafdd039dd110a79c459012426fcf56d173a2de77ca7da78104eefd69e832cfcefde55af8fa9

          • C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe

            Filesize

            1.7MB

            MD5

            c2bc12ff669c5f3df9900d71e5decbad

            SHA1

            fee9eef9a318fdb89aec088533e4ce1086009bfd

            SHA256

            a0f7a81c4e5713b711d695a8de5039d09044baf090d49e94cb6cec0c83002349

            SHA512

            e466310f8c3a900558051136d1839e317ddd59102cd395ec38bbe1afa3166c9c7ad4c7cf09aab62dcac3552b1f65dcd2f2e571d9c104a1fe645ddc2509a5bc93

          • C:\Users\Admin\AppData\Roaming\Temp\Admin0.bat

            Filesize

            129B

            MD5

            d1073c9b34d1bbd570928734aacff6a5

            SHA1

            78714e24e88d50e0da8da9d303bec65b2ee6d903

            SHA256

            b3c704b1a728004fc5e25899d72930a7466d7628dd6ddd795b3000897dfa4020

            SHA512

            4f2b9330e30fcc55245dc5d12311e105b2b2b9d607fbfc4a203c69a740006f0af58d6a01e2da284575a897528da71a2e61a7321034755b78feb646c8dd12347f

          • C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat

            Filesize

            126B

            MD5

            2bfc32ffbd3815d052e086ae25fe30da

            SHA1

            454c0bddd7ef1e59509b537f3523666e89bd511f

            SHA256

            1770e68572dd740aab76d28ddd346866a53d39080a21fb6298f1f45da88544b9

            SHA512

            12b30ddbc0514c0cfae0008824dce0c97d45f869339edfb283536c60851027943acb00cbcf781f967ca8f100b5a87e1f39ab063a43105d8f51a822326a1c8d4f

          • C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat

            Filesize

            196B

            MD5

            5b1fe8450c12801000286fb97810cf18

            SHA1

            fd91844e48eab19f674e8ef7b7c84b481aec64b1

            SHA256

            0237f32edc4d323baca4c75d4b2da907aa84a497bceb7d33e1ac03044c924ddb

            SHA512

            9dcbc3fd724af57473ca799caf9c1e3bef7b50e4e4bea0e021c55a0a73e42d4869d0089ad4daf607d95e956db59b1c07a9c7eb628dd817ca87b4a7b4e6372dbe

          • C:\Users\Admin\AppData\Roaming\Temp\Admin2.bat

            Filesize

            102B

            MD5

            3ca08f080a7a28416774d80552d4aa08

            SHA1

            0b5f0ba641204b27adac4140fd45dce4390dbf24

            SHA256

            4e7d460b8dc9f2c01b4c5a16fb956aced10127bc940e8039a80c6455901ea1f0

            SHA512

            0c64aa462ff70473ef763ec392296fe0ea59b5340c26978531a416732bc3845adf9ca7b673cb7b4ba40cc45674351206096995c43600fccbbbe64e51b6019f01

          • C:\Users\Admin\AppData\Roaming\Temp\mydll.dll

            Filesize

            388KB

            MD5

            8d7db101a7211fe3309dc4dc8cf2dd0a

            SHA1

            6c2781eadf53b3742d16dab2f164baf813f7ac85

            SHA256

            93db7c9699594caa19490280842fbebec3877278c92128b92e63d75fcd01397a

            SHA512

            8b139d447068519997f7bbc2c7c2fe3846b89ae1fba847258277c9ab92a93583b28fae7ffa444768929ed5852cc914c0270446cbf0bd20aca49bde6b6f809c83

          • C:\Windows\SysWOW64\mscaps.exe

            Filesize

            200KB

            MD5

            78d3c8705f8baf7d34e6a6737d1cfa18

            SHA1

            9f09e248a29311dbeefae9d85937b13da042a010

            SHA256

            2c4c9ec8e9291ba5c73f641af2e0c3e1bbd257ac40d9fb9d3faab7cebc978905

            SHA512

            9a3c3175276da58f1bc8d1138e63238c8d8ccfbfa1a8a1338e88525eca47f8d745158bb34396b7c3f25e4296be5f45a71781da33ad0bbdf7ad88a9c305b85609

          • C:\Windows\SysWOW64\mscaps.exe

            Filesize

            165KB

            MD5

            a8f8b1862b1140e2253069289e317c2e

            SHA1

            c7146bc3825d1bef911aa87a2b0502114938a15b

            SHA256

            0e02c6b07d02d7aa1a425a8ba4e2274887879964ddc16d71270311e471632189

            SHA512

            c147a9e1217f92a508df3bd913ad8a6ac10525183d4f04a905a1a33207c6c7395e71aabc4d3390dca8f2d03c7c8bfac969f5df4dd41b64802795f6cc7e5345d3

          • memory/2528-20-0x0000000010000000-0x0000000010015000-memory.dmp

            Filesize

            84KB