Analysis
-
max time kernel
137s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18/03/2024, 10:45
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-18_aae20f939bb903a31282e41b04ccb66c_icedid.exe
Resource
win7-20240221-en
General
-
Target
2024-03-18_aae20f939bb903a31282e41b04ccb66c_icedid.exe
-
Size
284KB
-
MD5
aae20f939bb903a31282e41b04ccb66c
-
SHA1
6ab6973819a6407c51aa31a81f27f03e6425defe
-
SHA256
874f75009b3c7746a09706fac6206c4c73ec7d9113a991adac87e3fcae5659e8
-
SHA512
8affba1b3f6e2864a46454efc1f93d7f4520a054f6064c23757e780daf36847cd77575acabbf24423de1d3da0cd3badf18abae3211a2f87f6e6caaca8c5b824e
-
SSDEEP
6144:KlDx7mlcAZBcIdqkorDfoR/0C1fzDB9ePHSJ:KlDx7mlHZo7HoRv177ePH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4776 sethome5953.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created \??\c:\windows\system\sethome5953.exe 2024-03-18_aae20f939bb903a31282e41b04ccb66c_icedid.exe File opened for modification \??\c:\windows\system\sethome5953.exe 2024-03-18_aae20f939bb903a31282e41b04ccb66c_icedid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.baiduo.org/" 2024-03-18_aae20f939bb903a31282e41b04ccb66c_icedid.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1736 2024-03-18_aae20f939bb903a31282e41b04ccb66c_icedid.exe 1736 2024-03-18_aae20f939bb903a31282e41b04ccb66c_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1736 2024-03-18_aae20f939bb903a31282e41b04ccb66c_icedid.exe 1736 2024-03-18_aae20f939bb903a31282e41b04ccb66c_icedid.exe 1736 2024-03-18_aae20f939bb903a31282e41b04ccb66c_icedid.exe 1736 2024-03-18_aae20f939bb903a31282e41b04ccb66c_icedid.exe 4776 sethome5953.exe 4776 sethome5953.exe 4776 sethome5953.exe 4776 sethome5953.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1736 wrote to memory of 4776 1736 2024-03-18_aae20f939bb903a31282e41b04ccb66c_icedid.exe 101 PID 1736 wrote to memory of 4776 1736 2024-03-18_aae20f939bb903a31282e41b04ccb66c_icedid.exe 101 PID 1736 wrote to memory of 4776 1736 2024-03-18_aae20f939bb903a31282e41b04ccb66c_icedid.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-18_aae20f939bb903a31282e41b04ccb66c_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-18_aae20f939bb903a31282e41b04ccb66c_icedid.exe"1⤵
- Drops file in Windows directory
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
\??\c:\windows\system\sethome5953.exec:\windows\system\sethome5953.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Internet Explorer.lnk
Filesize1KB
MD50191104e1d5e2fb4f19d7ed7a6b4cdf8
SHA151f3ddeea8605de4788f9c41235ff5b8915bdf4c
SHA256c38d7e300d5ab6b184ccd5ec9f4c3aa95cce8238910cc1cd67cca2b74abfa1d0
SHA51220a7014eef977f59342d334cd1390ec4984046954f5598e46b0c306120c6ce8f2e74348f539bc3b70ad300168cf0bafe8fb668a56aae54a7674f7cd7d2678f5c
-
Filesize
284KB
MD59d511e926552a1bfbeaf9ce13b2cf499
SHA16dfca3153bb339df4c6934440ef60009dd77a08b
SHA25687acfa79ba826978b249d1cda95ceb07cde54a17e13c7f470823843b66a39c34
SHA5125663279caf9be749380018e93de13e508ab10d1029d11b327cb9dba03091fb7143b1b04ebd0dbd00fb057e9e7f4fd62dd491ab391d10fbb7f61005c80bc3a31c