Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/04/2024, 15:56
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-16_0f3185cfacdee33bc381c0cdd92c7972_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-16_0f3185cfacdee33bc381c0cdd92c7972_icedid.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-16_0f3185cfacdee33bc381c0cdd92c7972_icedid.exe
-
Size
3.3MB
-
MD5
0f3185cfacdee33bc381c0cdd92c7972
-
SHA1
9d487fb0e2498a3cdef7a71a888d58518b0f11ed
-
SHA256
93b0bda1c86aacbf94300e66206d104cc1a7df70ec71bc217d63c1ab6a3c9c19
-
SHA512
77409ffd5622211c18baf76869bc1262e7bf1d4b9d30b02ccb755ef6eaf813b521d6f3a503b3c930e79532b2ae0c2f2bb2eb0f87c57d4ba2741daccff95aa55f
-
SSDEEP
98304:CmJi+eglbtDVG4exFK/USjlOc4KgDE62KFjI:ClIbtAulO2gD2KFjI
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\svchost.exe" 2024-04-16_0f3185cfacdee33bc381c0cdd92c7972_icedid.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 2024-04-16_0f3185cfacdee33bc381c0cdd92c7972_icedid.exe -
Executes dropped EXE 1 IoCs
pid Process 2640 2024-04-16_0f3185cfacdee33bc381c0cdd92c7972_icedid.exe -
Loads dropped DLL 6 IoCs
pid Process 2932 2024-04-16_0f3185cfacdee33bc381c0cdd92c7972_icedid.exe 2292 WerFault.exe 2292 WerFault.exe 2292 WerFault.exe 2292 WerFault.exe 2292 WerFault.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\svchost.exe 2024-04-16_0f3185cfacdee33bc381c0cdd92c7972_icedid.exe File opened for modification C:\Windows\conime.exe 2024-04-16_0f3185cfacdee33bc381c0cdd92c7972_icedid.exe File created C:\Windows\svchost.exe 2024-04-16_0f3185cfacdee33bc381c0cdd92c7972_icedid.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2292 2640 WerFault.exe 28 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2932 2024-04-16_0f3185cfacdee33bc381c0cdd92c7972_icedid.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2640 2024-04-16_0f3185cfacdee33bc381c0cdd92c7972_icedid.exe 2640 2024-04-16_0f3185cfacdee33bc381c0cdd92c7972_icedid.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2640 2932 2024-04-16_0f3185cfacdee33bc381c0cdd92c7972_icedid.exe 28 PID 2932 wrote to memory of 2640 2932 2024-04-16_0f3185cfacdee33bc381c0cdd92c7972_icedid.exe 28 PID 2932 wrote to memory of 2640 2932 2024-04-16_0f3185cfacdee33bc381c0cdd92c7972_icedid.exe 28 PID 2932 wrote to memory of 2640 2932 2024-04-16_0f3185cfacdee33bc381c0cdd92c7972_icedid.exe 28 PID 2640 wrote to memory of 2292 2640 2024-04-16_0f3185cfacdee33bc381c0cdd92c7972_icedid.exe 29 PID 2640 wrote to memory of 2292 2640 2024-04-16_0f3185cfacdee33bc381c0cdd92c7972_icedid.exe 29 PID 2640 wrote to memory of 2292 2640 2024-04-16_0f3185cfacdee33bc381c0cdd92c7972_icedid.exe 29 PID 2640 wrote to memory of 2292 2640 2024-04-16_0f3185cfacdee33bc381c0cdd92c7972_icedid.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_0f3185cfacdee33bc381c0cdd92c7972_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-16_0f3185cfacdee33bc381c0cdd92c7972_icedid.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\2024-04-16_0f3185cfacdee33bc381c0cdd92c7972_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-16_0f3185cfacdee33bc381c0cdd92c7972_icedid.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2640 -s 2483⤵
- Loads dropped DLL
- Program crash
PID:2292
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.3MB
MD516b72dbdbd99ce0888f52ad3e61f69ff
SHA10902e6a2de2eed4e0f18a4a9961ad1973b886181
SHA25690e8239cb1d773e4df1910b5b5aa686ed7653c8a3e900f5f9b45a6ceca76f703
SHA5126dddf33fe3b276184c58ba4b1480435dbd32bc4d55be0348ddae06e856c7641cb49b46ee38cca50e628963618672e5e3850014dca820b983539a574fef2ec2d6
-
Filesize
35KB
MD5a503352f509804e37e2f6904a2374e48
SHA177513a2e0a8e6874d5c4259689407001281e85af
SHA2565a1ae64e786ccb8e4d8fa9827db76f5bdfe7fe0c402b4367a1dfb7df296f48ce
SHA51203f54e4297aad903750c53613d7db56818f64bf344c9e528aa8cf74c076b44ffbf9e9538e659d413c5d80dbffc8963e550b483c8f8cd3682b3d4c4e5c933d00a