Analysis

  • max time kernel
    62s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    19-04-2024 21:03

General

  • Target

    2024-04-19_dcdc5658c11b9103a4786a35b7459f0e_icedid.exe

  • Size

    1.5MB

  • MD5

    dcdc5658c11b9103a4786a35b7459f0e

  • SHA1

    911c5f2ff1096b7fe3d1f3060bdffd801a777e29

  • SHA256

    d87ae762b88946480a52feb99559d8195af163efcbcd605e0f05c43a4892fb07

  • SHA512

    acc3099b2a108996acc0988fe5b20414f41a6b82f789e87c589d20f32226a2f0e93f53c4a8a3229a9fd1756e71c3cdeb577c35f3309a59a9555129e8f7b2eb54

  • SSDEEP

    24576:9d8fS1xamM7uH3KHSEmoK+MtENLMieNmYvXE:9GfUamM7uH3KH7moK+MtENLd4mIXE

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-19_dcdc5658c11b9103a4786a35b7459f0e_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-19_dcdc5658c11b9103a4786a35b7459f0e_icedid.exe"
    1⤵
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2868
    • C:\Users\Admin\AppData\Local\Temp\2D67.tmp
      C:\Users\Admin\AppData\Local\Temp\2D67.tmp
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      PID:1428
    • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Reader_sl.exe
      "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Reader_sl.exe"
      2⤵
        PID:488

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\2D67.tmp

      Filesize

      145KB

      MD5

      c610e7ccd6859872c585b2a85d7dc992

      SHA1

      362b3d4b72e3add687c209c79b500b7c6a246d46

      SHA256

      14063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041

      SHA512

      8570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666

    • C:\Users\Admin\AppData\Local\Temp\AdobeARM.log

      Filesize

      848B

      MD5

      fa41a81574be9166fbedf550e6ce15b2

      SHA1

      4e42c4661c43df3aaba522ed05bd0207800d8f54

      SHA256

      0d522e0a45405699ad32f8388fb3158964ec901da6d52ae5878916c08ca3a61e

      SHA512

      a9ace68af0f55f8c3575c2876e0de2f7fd3184a57f95688da4ee84e559058e789af2299c01e801ee84ade766c7bd4db32f8890543e68ef8ee6bdf50e6332d4af

    • C:\Users\Admin\AppData\Local\Temp\ArmUI.ini

      Filesize

      251KB

      MD5

      864c22fb9a1c0670edf01c6ed3e4fbe4

      SHA1

      bf636f8baed998a1eb4531af9e833e6d3d8df129

      SHA256

      b4d4dcd9594d372d7c0c975d80ef5802c88502895ed4b8a26ca62e225f2f18b0

      SHA512

      ff23616ee67d51daa2640ae638f59a8d331930a29b98c2d1bd3b236d2f651f243f9bae38d58515714886cfbb13b9be721d490aad4f2d10cbba74d7701ab34e09

    • memory/2868-1-0x0000000000250000-0x0000000000298000-memory.dmp

      Filesize

      288KB