Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16-04-2024 22:56

General

  • Target

    2024-04-16_c3c072d73d6461eece384d5942a88760_icedid.exe

  • Size

    2.0MB

  • MD5

    c3c072d73d6461eece384d5942a88760

  • SHA1

    e252ff4e3c94ddf10a5a31c06fe7784a34f17933

  • SHA256

    4f9f61ba700b7408ff9b3bb9450ab487eee278a60b07f46df86334d8ce792ae9

  • SHA512

    230af63617abb602516b8ecd02c440373efe8b9ead5adbd15004e6785904a460ab916c25c0777592780dba2bff1957dabd1b9c4d18c5cb61e3b968a251f71a67

  • SSDEEP

    49152:lXSoepZbTChxKCnFnQXBbrtgb/iQvu0UHOaYmLS:lXSTpZ6hxvWbrtUTrUHO2O

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 11 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-16_c3c072d73d6461eece384d5942a88760_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-16_c3c072d73d6461eece384d5942a88760_icedid.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2488
    • C:\Windows\SysWOW64\explorer.exe
      explorer.exe
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2740
      • C:\Users\Admin\AppData\Local\Temp\@AE5D0E.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\@AE5D0E.tmp.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2552
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin0.bat" "
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2900
          • C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3036
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat" "
              6⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:2108
              • C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe" /i 3036
                7⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:892
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin2.bat" "
                  8⤵
                  • Loads dropped DLL
                  • Suspicious use of WriteProcessMemory
                  PID:1592
                  • C:\Users\Admin\AppData\Local\Temp\wtmps.exe
                    "C:\Users\Admin\AppData\Local\Temp\wtmps.exe"
                    9⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Suspicious use of WriteProcessMemory
                    PID:2680
                    • C:\Windows\SysWOW64\mscaps.exe
                      "C:\Windows\system32\mscaps.exe" /C:\Users\Admin\AppData\Local\Temp\wtmps.exe
                      10⤵
                      • Executes dropped EXE
                      PID:2536
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat" "
          4⤵
            PID:2128
        • C:\Users\Admin\AppData\Local\Temp\2024-04-16_c3c072d73d6461eece384d5942a88760_icedid.exe
          "C:\Users\Admin\AppData\Local\Temp\2024-04-16_c3c072d73d6461eece384d5942a88760_icedid.exe"
          3⤵
          • Executes dropped EXE
          PID:2888

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\77DE.tmp

      Filesize

      406B

      MD5

      37512bcc96b2c0c0cf0ad1ed8cfae5cd

      SHA1

      edf7f17ce28e1c4c82207cab8ca77f2056ea545c

      SHA256

      27e678bf5dc82219d6edd744f0b82567a26e40f8a9dcd6487205e13058e3ed1f

      SHA512

      6d4252ab5aa441a76ce2127224fefcb221259ab4d39f06437b269bd6bfdaae009c8f34e9603ec734159553bc9f1359bdd70316cd426d73b171a9f17c41077641

    • C:\Users\Admin\AppData\Local\Temp\tmp68C1.tmp

      Filesize

      1.0MB

      MD5

      df2c63605573c2398d796370c11cb26c

      SHA1

      efba97e2184ba3941edb008fcc61d8873b2b1653

      SHA256

      07ffcde2097d0af67464907fec6a4079b92da11583013bae7d3313fa32312fe8

      SHA512

      d9726e33fcfa96415cc906bdb1b0e53eba674eaf30ed77d41d245c1c59aa53e222246f691d82fa3a45f049fbf23d441768f9da21370e489232770ad5ae91d32f

    • C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe

      Filesize

      1.8MB

      MD5

      6218656d763ab960824ea853783a412d

      SHA1

      8885edb98a29b0326a63c246be9a20f39f66781a

      SHA256

      6d399868a3ba2b6b04dfd8cd684debd2ff682f09a452361e6725a78fb853c06c

      SHA512

      d695d7cba78ba112de48d80a4d19fc1566e8a4897b30d2263490f60ab96467c2e2fcd292f0e5be3205093a85bc3b42b9fa39ef1726d18a3da85f0fc38b5ae6f6

    • C:\Users\Admin\AppData\Roaming\Temp\Admin0.bat

      Filesize

      129B

      MD5

      d1073c9b34d1bbd570928734aacff6a5

      SHA1

      78714e24e88d50e0da8da9d303bec65b2ee6d903

      SHA256

      b3c704b1a728004fc5e25899d72930a7466d7628dd6ddd795b3000897dfa4020

      SHA512

      4f2b9330e30fcc55245dc5d12311e105b2b2b9d607fbfc4a203c69a740006f0af58d6a01e2da284575a897528da71a2e61a7321034755b78feb646c8dd12347f

    • C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat

      Filesize

      126B

      MD5

      3ed4e43335a2d21eb3685b65762a7598

      SHA1

      ee1ada091792455474b3e8cb2e5667978506f74b

      SHA256

      1c8ac45e853a406f24dac10ba5487e887d359bd864eaf90e10b6003fd2dcbc71

      SHA512

      d026202466a342ba13fd5ad69b512ff553e8a4d1be88c392f618a2648c632447d5f7a02816e74b23fd850c8155b774b4abf2bef8b9a3f3ae425bdf59571a2247

    • C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat

      Filesize

      196B

      MD5

      eade35b429b2374904e1bb015d911091

      SHA1

      baf1de97fed7c1a534a24d89f697166c040fc82f

      SHA256

      a0b64d776db8995829c4d764b025a5093c7dfe64fbb7ab4564545e86956ab700

      SHA512

      9083ca75fbbccf4ecfbbe7d23c92cbd4d95b1f8a4a584dd41228f00337b4c9a71e637499b8d0b7b785b12ae610c2de83f616c34ffd0269c9f2cffc30fc488bc0

    • C:\Users\Admin\AppData\Roaming\Temp\Admin2.bat

      Filesize

      102B

      MD5

      3ca08f080a7a28416774d80552d4aa08

      SHA1

      0b5f0ba641204b27adac4140fd45dce4390dbf24

      SHA256

      4e7d460b8dc9f2c01b4c5a16fb956aced10127bc940e8039a80c6455901ea1f0

      SHA512

      0c64aa462ff70473ef763ec392296fe0ea59b5340c26978531a416732bc3845adf9ca7b673cb7b4ba40cc45674351206096995c43600fccbbbe64e51b6019f01

    • C:\Windows\SysWOW64\mscaps.exe

      Filesize

      200KB

      MD5

      78d3c8705f8baf7d34e6a6737d1cfa18

      SHA1

      9f09e248a29311dbeefae9d85937b13da042a010

      SHA256

      2c4c9ec8e9291ba5c73f641af2e0c3e1bbd257ac40d9fb9d3faab7cebc978905

      SHA512

      9a3c3175276da58f1bc8d1138e63238c8d8ccfbfa1a8a1338e88525eca47f8d745158bb34396b7c3f25e4296be5f45a71781da33ad0bbdf7ad88a9c305b85609

    • \Users\Admin\AppData\Local\Temp\2024-04-16_c3c072d73d6461eece384d5942a88760_icedid.exe

      Filesize

      237KB

      MD5

      887866144c01bb83dd4baa115843641d

      SHA1

      a5b82bea9d643e7a1385fc74fbf1641b511af797

      SHA256

      330a6601a1c2a62466bf8f6767855926c340d101dd717d19238d48c27be87f98

      SHA512

      c7153f6e9458950c762df85605681f74c940b07b063c5ef902764257c819f431b023cc414af41ad081ddba2de8f86c20f12fc22758ec9a37887d12bf3cccadf1

    • \Users\Admin\AppData\Local\Temp\@AE5D0E.tmp.exe

      Filesize

      1.8MB

      MD5

      d14ebf7ff6a2b372981bafded3524cf1

      SHA1

      2a7848ccd5dadb1560333acea17077da506bf81d

      SHA256

      0867fe3262ec8a7944518b344a497f83646f26f18666a0cb97491092ed317e50

      SHA512

      24a11b73a0244b8dd17dd2687479e77a7f6a8ae4f100c0256f91b4e0929f44c8a063ae23a5e3dc9f520b72d11555bdd0879497b4b298ece344143607cd4c4835

    • \Users\Admin\AppData\Local\Temp\wtmps.exe

      Filesize

      276KB

      MD5

      75c1467042b38332d1ea0298f29fb592

      SHA1

      f92ea770c2ddb04cf0d20914578e4c482328f0f8

      SHA256

      3b20c853d4ca23240cd338b8cab16f1027c540ddfe9c4ffdca1624d2f923b373

      SHA512

      5c47c59ad222e2597ccdf2c100853c48f022e933f44c279154346eacf9e7e6f54214ada541d43a10424035f160b56131aab206c11512a9fd6ea614fbd3160aa0

    • \Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe

      Filesize

      172KB

      MD5

      daac1781c9d22f5743ade0cb41feaebf

      SHA1

      e2549eeeea42a6892b89d354498fcaa8ffd9cac4

      SHA256

      6a7093440420306cf7de53421a67af8a1094771e0aab9535acbd748d08ed766c

      SHA512

      190a7d5291e20002f996edf1e04456bfdff8b7b2f4ef113178bd42a9e5fd89fe6d410ae2c505de0358c4f53f9654ac1caaa8634665afa6d9691640dd4ee86160

    • \Users\Admin\AppData\Roaming\Temp\mydll.dll

      Filesize

      202KB

      MD5

      7ff15a4f092cd4a96055ba69f903e3e9

      SHA1

      a3d338a38c2b92f95129814973f59446668402a8

      SHA256

      1b594e6d057c632abb3a8cf838157369024bd6b9f515ca8e774b22fe71a11627

      SHA512

      4b015d011c14c7e10568c09bf81894681535efb7d76c3ef9071fffb3837f62b36e695187b2d32581a30f07e79971054e231a2ca4e8ad7f0f83d5876f8c086dae

    • memory/892-328-0x0000000010000000-0x0000000010015000-memory.dmp

      Filesize

      84KB

    • memory/2552-11-0x0000000010000000-0x0000000010015000-memory.dmp

      Filesize

      84KB