Analysis

  • max time kernel
    144s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27-03-2024 18:26

General

  • Target

    2024-03-27_890ccdd953ad624f557516c5f94ef5ec_icedid.exe

  • Size

    2.0MB

  • MD5

    890ccdd953ad624f557516c5f94ef5ec

  • SHA1

    0137cd95c0cfbb4ea2659253b13f781a980914c0

  • SHA256

    d61b83ccbe8a440efc227f483a6a67000d7fb671b4c38227a2068fa4e5528e23

  • SHA512

    c7ce61f6ebb9b77d0ea5e63be869b9528e34d3c8add9ee34464d1f8f12b7f8a92d9a27fe3d3bbe70d680040f0fab909efdfb7e3e72425db2390d96c80616b11a

  • SSDEEP

    49152:vnsHyjtk2MYC5GDuTq24GjdGS9hWb2J3Y2p9tGk5fA:vnsmtk2aeEjdGSGb2Jo2b75fA

Score
9/10

Malware Config

Signatures

  • Detects Windows executables referencing non-Windows User-Agents 12 IoCs
  • Detects executables (downlaoders) containing URLs to raw contents of a paste 12 IoCs
  • Detects executables Discord URL observed in first stage droppers 12 IoCs
  • Detects executables manipulated with Fody 12 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-27_890ccdd953ad624f557516c5f94ef5ec_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-27_890ccdd953ad624f557516c5f94ef5ec_icedid.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1888
    • C:\Users\Admin\AppData\Local\Temp\._cache_2024-03-27_890ccdd953ad624f557516c5f94ef5ec_icedid.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_2024-03-27_890ccdd953ad624f557516c5f94ef5ec_icedid.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2380
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 1384
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2816
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2536
      • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2524
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2524 -s 1440
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2296
  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    2.0MB

    MD5

    890ccdd953ad624f557516c5f94ef5ec

    SHA1

    0137cd95c0cfbb4ea2659253b13f781a980914c0

    SHA256

    d61b83ccbe8a440efc227f483a6a67000d7fb671b4c38227a2068fa4e5528e23

    SHA512

    c7ce61f6ebb9b77d0ea5e63be869b9528e34d3c8add9ee34464d1f8f12b7f8a92d9a27fe3d3bbe70d680040f0fab909efdfb7e3e72425db2390d96c80616b11a

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    766KB

    MD5

    d520ee00f828614597042e9f7bf181c6

    SHA1

    a9ec6ac326b95a29875bdac6b6cef03ad93d11da

    SHA256

    fecb2ae2e9c5e4f200527c6ce46386f4ae85047f4fb2d6e79b11f2529c3ddfd0

    SHA512

    1b3b46a0c2fe10e0b56a3cc0774d1e57a3b2a303844be393d68051394d2a31256df4d6ff4e583c880c637e3d400bf9c7407c88c57cdad853d122abea53c277d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cbd9163a2f3d499d70f41ff62278baab

    SHA1

    74481156354ed44f087fee5d11552f43c68f07d2

    SHA256

    e14c8cc9f22212d10eed9c8b8b934f01337f5c806e9bf1e3d58731fa4147949c

    SHA512

    d7e21a081c3111247e3c2cd12cdf573b39676b90b2378c0991c4e7473734c872ce4aea76f6390b63882f173124d950e7dc22a013024ba5f884fa78425de784c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    164e434acadc71c6b8f68443efe2e68a

    SHA1

    7b639dc2a4a9250b53c3a82b75de50b9cad9c869

    SHA256

    4c98bf43b03ec5a388bcbf11d10ddb0b41658acedba9c5f8643351e1242749b2

    SHA512

    c5f27d7017c41a86af4cfce0c256b70c42c5ccb59c53af9274900934175927383d122819642cb9eb3378fe32a62387b700f9eb4f6e696c4a5b6f86e50248252f

  • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe

    Filesize

    448KB

    MD5

    5e1bf4170b58c6a6c18e2bee8e91ac54

    SHA1

    bad7ebb1cbe312fd696c721525ba4b89e91d37e9

    SHA256

    0195ff04db08b3b11d0d9c9dc0782daac57159078818ae7daa6e8646e849469b

    SHA512

    0256b5f1661a91a2f6029786f40341546a1036cf5eb900ae5d88413f5c3a5c92204cf2dc57e737f87adffd81b16e6ec6caea03eeeb88e4fb724a4529fb924b38

  • C:\Users\Admin\AppData\Local\Temp\Cab47DA.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\CheckerCfg.ini

    Filesize

    153B

    MD5

    93f58e7229530ad2b22774f170a2f581

    SHA1

    ad0112b8a300283d645b2070f15c58777688154f

    SHA256

    aa7f10c8d0eca33b326ebb1f41f160fc59c04dbc60fac4c150e32c466181689d

    SHA512

    3bce7f38886bf105e1fcf21b04a320c69f62ead7026958e7e7c2144b6fb9dc0b002b52f5a2fbafc681926a42e68528ddf39c8e218112724345a5129d35dd2c24

  • C:\Users\Admin\AppData\Local\Temp\Tar4965.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Local\Temp\jsTkj8Zq.xlsm

    Filesize

    17KB

    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • \ProgramData\Synaptics\Synaptics.exe

    Filesize

    702KB

    MD5

    594707ef3e9bbee08b03670b2e841ed1

    SHA1

    2ec5ffd6d0d44820d412b15a993ef9080366f476

    SHA256

    95e32e3169391bd03710b22093d7086f2435229055be7ae0ec3628232a105a5a

    SHA512

    729f99cf4229594aeb2c52c10542e6de3d407b6d55a44bfa0c9ff097b0284b8cad3e44afc8b44791c69fe750938e96f57681c185801d24237c5a3d599a1a2098

  • \Users\Admin\AppData\Local\Temp\._cache_2024-03-27_890ccdd953ad624f557516c5f94ef5ec_icedid.exe

    Filesize

    1.2MB

    MD5

    c0ea55286540db56bee76d56ccb295bc

    SHA1

    c7c63f6ffab5925ba9c7d9f9e4f7b494bc00eb68

    SHA256

    310739bba1cf863d2d54e2fa15a48f3163dd2eee9839c70db4cd4aa435da44fa

    SHA512

    e8ca1f979d329cd7cd4a6bd46fcf5abbebac3dad138c8cd751489751dccccd8eea092161fe8130b59d3cdd5cfa724bb59f7178a70c3fe62a6557be763c419c37

  • \Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe

    Filesize

    543KB

    MD5

    7080ec8d308eb139dc5944da52ecc755

    SHA1

    eb7eec6df9a6d3e914979efb65844b37b71c984a

    SHA256

    b0d440af75a2b13757f2e6d36cce3171eee0549e8b24026153fe1006854ec129

    SHA512

    ff951f9e9e892f91d092d56242893538f1cf7fa74d339eb2fd6eedb11d9db047802dd7ffb6b8b9adb15ae806a243b4cfe60ebb4c1e2d977779271d8d273b8b93

  • memory/1888-27-0x0000000000400000-0x00000000005FC000-memory.dmp

    Filesize

    2.0MB

  • memory/1888-0-0x0000000000300000-0x0000000000301000-memory.dmp

    Filesize

    4KB

  • memory/2020-52-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2020-162-0x000000006F85D000-0x000000006F868000-memory.dmp

    Filesize

    44KB

  • memory/2020-53-0x000000006F85D000-0x000000006F868000-memory.dmp

    Filesize

    44KB

  • memory/2380-48-0x0000000000540000-0x000000000055C000-memory.dmp

    Filesize

    112KB

  • memory/2380-156-0x0000000074280000-0x000000007496E000-memory.dmp

    Filesize

    6.9MB

  • memory/2380-39-0x0000000074280000-0x000000007496E000-memory.dmp

    Filesize

    6.9MB

  • memory/2380-47-0x0000000004B80000-0x0000000004BC0000-memory.dmp

    Filesize

    256KB

  • memory/2380-43-0x0000000004B80000-0x0000000004BC0000-memory.dmp

    Filesize

    256KB

  • memory/2380-161-0x0000000004B80000-0x0000000004BC0000-memory.dmp

    Filesize

    256KB

  • memory/2380-41-0x00000000003A0000-0x00000000003C6000-memory.dmp

    Filesize

    152KB

  • memory/2380-158-0x0000000004B80000-0x0000000004BC0000-memory.dmp

    Filesize

    256KB

  • memory/2380-30-0x0000000000AE0000-0x0000000000C1E000-memory.dmp

    Filesize

    1.2MB

  • memory/2524-160-0x0000000000AA0000-0x0000000000AE0000-memory.dmp

    Filesize

    256KB

  • memory/2524-46-0x0000000000AA0000-0x0000000000AE0000-memory.dmp

    Filesize

    256KB

  • memory/2524-157-0x0000000074280000-0x000000007496E000-memory.dmp

    Filesize

    6.9MB

  • memory/2524-44-0x0000000004EC0000-0x0000000004F6A000-memory.dmp

    Filesize

    680KB

  • memory/2524-42-0x0000000074280000-0x000000007496E000-memory.dmp

    Filesize

    6.9MB

  • memory/2524-40-0x00000000011B0000-0x00000000012EE000-memory.dmp

    Filesize

    1.2MB

  • memory/2524-45-0x0000000000AA0000-0x0000000000AE0000-memory.dmp

    Filesize

    256KB

  • memory/2536-26-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2536-154-0x0000000000400000-0x00000000005FC000-memory.dmp

    Filesize

    2.0MB

  • memory/2536-155-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2536-159-0x0000000000400000-0x00000000005FC000-memory.dmp

    Filesize

    2.0MB

  • memory/2536-196-0x0000000000400000-0x00000000005FC000-memory.dmp

    Filesize

    2.0MB