Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2024, 05:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-16_35bd8729f33c48f68371a53609d60708_icedid.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-03-16_35bd8729f33c48f68371a53609d60708_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-16_35bd8729f33c48f68371a53609d60708_icedid.exe
-
Size
3.7MB
-
MD5
35bd8729f33c48f68371a53609d60708
-
SHA1
1ad939dd1177fb3b6c9d072ece26416e03025313
-
SHA256
5dc51b094f67288c8648674d14a86c2e9db229a5252f5d772884a0eb021c6637
-
SHA512
7fc0d5de284edf8bed3d58be65f3a5a06297ea8f27d8a2c7fa9e421c0d8ce6e7bfbee7984f68196da23b00ed46c7f5cf71b6d55bf85b27f0bc63b85619700d5b
-
SSDEEP
98304:6ITpXbPOnL78DEdffv/v/X16nSE/dgBGbdYaIIqmwlTLobTE9BgD:6QpP6veYffv/v/wR/CBGbdYaIIqmwlTs
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1200 3048 WerFault.exe 86 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Software\Microsoft\Internet Explorer\TypedURLs 2024-03-16_35bd8729f33c48f68371a53609d60708_icedid.exe Key created \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Software\Microsoft\Internet Explorer\DOMStorage\msn.com 2024-03-16_35bd8729f33c48f68371a53609d60708_icedid.exe Key created \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage 2024-03-16_35bd8729f33c48f68371a53609d60708_icedid.exe Key created \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\msn.com 2024-03-16_35bd8729f33c48f68371a53609d60708_icedid.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\msn.com\NumberOfSubdomains = "1" 2024-03-16_35bd8729f33c48f68371a53609d60708_icedid.exe -
Modifies registry class 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{57658086-0BE8-4B7A-B30E-6F4CC9D3D371}\ 2024-03-16_35bd8729f33c48f68371a53609d60708_icedid.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{57658086-0BE8-4B7A-B30E-6F4CC9D3D371} 2024-03-16_35bd8729f33c48f68371a53609d60708_icedid.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 4244 svchost.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 3048 2024-03-16_35bd8729f33c48f68371a53609d60708_icedid.exe 3048 2024-03-16_35bd8729f33c48f68371a53609d60708_icedid.exe 3048 2024-03-16_35bd8729f33c48f68371a53609d60708_icedid.exe 3048 2024-03-16_35bd8729f33c48f68371a53609d60708_icedid.exe 3048 2024-03-16_35bd8729f33c48f68371a53609d60708_icedid.exe -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 3048 2024-03-16_35bd8729f33c48f68371a53609d60708_icedid.exe 3048 2024-03-16_35bd8729f33c48f68371a53609d60708_icedid.exe 3048 2024-03-16_35bd8729f33c48f68371a53609d60708_icedid.exe 3048 2024-03-16_35bd8729f33c48f68371a53609d60708_icedid.exe 3048 2024-03-16_35bd8729f33c48f68371a53609d60708_icedid.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3048 2024-03-16_35bd8729f33c48f68371a53609d60708_icedid.exe 3048 2024-03-16_35bd8729f33c48f68371a53609d60708_icedid.exe 3048 2024-03-16_35bd8729f33c48f68371a53609d60708_icedid.exe 3048 2024-03-16_35bd8729f33c48f68371a53609d60708_icedid.exe 3048 2024-03-16_35bd8729f33c48f68371a53609d60708_icedid.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-16_35bd8729f33c48f68371a53609d60708_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-16_35bd8729f33c48f68371a53609d60708_icedid.exe"1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3048 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3048 -s 29962⤵
- Program crash
PID:1200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3048 -ip 30481⤵PID:1128
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4200
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
293B
MD5466d52bbd57ea1c74d5a91205a1dc165
SHA146cccb28d055d35be58142733b981dc8da799be7
SHA256c0b202a3e91f90fc1f31368c328fae355941575d221a3dc8f5029679fa63eab7
SHA512f925d88aeba6791cc7a0161c799991192d7c17840086e289e90d44ee56829258f698a95ea02e77c96a96c102c2ec9c8701cd25b48246a093cdca2b8819c266e4