Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
05-04-2024 05:47
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-05_b752a01e0302b2c229e10f11cdcfca38_icedid.exe
Resource
win7-20240215-en
General
-
Target
2024-04-05_b752a01e0302b2c229e10f11cdcfca38_icedid.exe
-
Size
284KB
-
MD5
b752a01e0302b2c229e10f11cdcfca38
-
SHA1
9d693cbba74be6fbf9a091e28659fd62fba99b18
-
SHA256
d346055c75f12be1603847f56639816a6bc97293a2a4d9ca9338a987da30f76e
-
SHA512
eff68b91b32520b7bc2aa0864c6fcd3f1eeaefa1fa9bab20e29226b6ea9eb06333793dd546b9a31d578eeb7270442cf3b089ded43042310e68260b1fe07637a7
-
SSDEEP
6144:olDx7mlcAZBcIdqkorDfoR/0C1fzDB9ePHSJ:olDx7mlHZo7HoRv177ePH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2844 sethome6855.exe -
Loads dropped DLL 2 IoCs
pid Process 1876 2024-04-05_b752a01e0302b2c229e10f11cdcfca38_icedid.exe 1876 2024-04-05_b752a01e0302b2c229e10f11cdcfca38_icedid.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created \??\c:\windows\system\sethome6855.exe 2024-04-05_b752a01e0302b2c229e10f11cdcfca38_icedid.exe File opened for modification \??\c:\windows\system\sethome6855.exe 2024-04-05_b752a01e0302b2c229e10f11cdcfca38_icedid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.baiduo.org/" 2024-04-05_b752a01e0302b2c229e10f11cdcfca38_icedid.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1876 2024-04-05_b752a01e0302b2c229e10f11cdcfca38_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1876 2024-04-05_b752a01e0302b2c229e10f11cdcfca38_icedid.exe 1876 2024-04-05_b752a01e0302b2c229e10f11cdcfca38_icedid.exe 1876 2024-04-05_b752a01e0302b2c229e10f11cdcfca38_icedid.exe 1876 2024-04-05_b752a01e0302b2c229e10f11cdcfca38_icedid.exe 2844 sethome6855.exe 2844 sethome6855.exe 2844 sethome6855.exe 2844 sethome6855.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1876 wrote to memory of 2844 1876 2024-04-05_b752a01e0302b2c229e10f11cdcfca38_icedid.exe 30 PID 1876 wrote to memory of 2844 1876 2024-04-05_b752a01e0302b2c229e10f11cdcfca38_icedid.exe 30 PID 1876 wrote to memory of 2844 1876 2024-04-05_b752a01e0302b2c229e10f11cdcfca38_icedid.exe 30 PID 1876 wrote to memory of 2844 1876 2024-04-05_b752a01e0302b2c229e10f11cdcfca38_icedid.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-05_b752a01e0302b2c229e10f11cdcfca38_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-05_b752a01e0302b2c229e10f11cdcfca38_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1876 -
\??\c:\windows\system\sethome6855.exec:\windows\system\sethome6855.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
965B
MD556e4308d08b84cf76d20943b0ea5d7f7
SHA1bfdc93bec5c52483bdc1a7de5c0b266c66e34cf0
SHA256f5fb3079ad3dfecca886f20a17eaba447d6abb300bf9a5b9490469baf23a349d
SHA512ab048513c24597e1e019b27871ec1d777aaf49e8277ecb079da5bf762f60964862c4d755e9d75a730f95077d6f838e9842bc5bc55d06ece0945ef775de7403fb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Internet Explorer (No Add-ons).lnk
Filesize1KB
MD50bde54f6bb7fa49c86d3e75c8c2874a5
SHA194aa6d806645bb181747c202a5245739d7d0392f
SHA256d4879558f025cd9e8426f955378dd9686ea99069246bf7e177effae1ca280b26
SHA512e7a7d82da54ba489df4fe6d015dfb2c36fe5c8e871b5199b75c0c401fc4f388e68b0e16eda4fb8977ae732672780fabb0066d319f4ebce2e1e0f46b309534f0f
-
Filesize
1KB
MD505d7ac163f983d7b24c5bb4551120b42
SHA1c9f3c9da70a8bb65418fa75be91376641145e6f8
SHA256107dad81edab6632c8ddc550cfe3372059a35b58b157ffeb09c54de05c4f1a41
SHA512d0673b8c827f50d91da3de6883105a06a714720af6379ada227eca6f3792f6a7a5231c7623ab8392ea23cf6b0d7fea8f6cecaffc9de21570600e996129546938
-
Filesize
284KB
MD594b552d560e2369b420585a1bb038ee4
SHA11f33fa14937bc9cd6664964b5e4441aad6bf8283
SHA256a2731c9ee6cd426b21748ac7583e9defdab99c608b8e66e79b9002f7cdc641b7
SHA512bb7e7b3588d01c3701c5cdf390e37d3f5cc2cff85752b6f1eeb0e3b1497cf8254dc83d4f17df450667f7d77c0fcb995f2d15bf3569df3003f66c54090561a06f