Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
28-04-2024 01:50
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-28_d6c0cf36d24f9c78d3e9c62c1ab10d7a_icedid.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-04-28_d6c0cf36d24f9c78d3e9c62c1ab10d7a_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-28_d6c0cf36d24f9c78d3e9c62c1ab10d7a_icedid.exe
-
Size
3.3MB
-
MD5
d6c0cf36d24f9c78d3e9c62c1ab10d7a
-
SHA1
40aef92c854049c716038a8ab79758d9d579b90d
-
SHA256
cc13d8ef2716a7653e04f1ee11a9be519897982cd83ae95559cb08513ed21c7e
-
SHA512
16b6b134417c3e9f067c2a1e8205067a2a9fac2b4d6342e2da7c8a90d8dcf4fff07ad39ade8e8b007a6a019419a58a733bb722463a472677f472380cf1b8a2bd
-
SSDEEP
98304:e4uTo0ZdxryDXakEfkslniBGT93rAS1Up0:e4eNeGTfksliBc933G+
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/464-16637-0x0000000000400000-0x0000000000548000-memory.dmp unk_chinese_botnet behavioral1/memory/11088-16644-0x0000000000400000-0x0000000000548000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 3 IoCs
Processes:
QQ.exesvchost.exeKvzbtbs.exepid Process 464 QQ.exe 2128 svchost.exe 11088 Kvzbtbs.exe -
Loads dropped DLL 3 IoCs
Processes:
2024-04-28_d6c0cf36d24f9c78d3e9c62c1ab10d7a_icedid.exepid Process 2912 2024-04-28_d6c0cf36d24f9c78d3e9c62c1ab10d7a_icedid.exe 2912 2024-04-28_d6c0cf36d24f9c78d3e9c62c1ab10d7a_icedid.exe 2912 2024-04-28_d6c0cf36d24f9c78d3e9c62c1ab10d7a_icedid.exe -
Drops file in System32 directory 1 IoCs
Processes:
Kvzbtbs.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Kvzbtbs.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
Processes:
QQ.exesvchost.exeKvzbtbs.exepid Process 464 QQ.exe 2128 svchost.exe 2128 svchost.exe 464 QQ.exe 2128 svchost.exe 464 QQ.exe 2128 svchost.exe 464 QQ.exe 2128 svchost.exe 464 QQ.exe 2128 svchost.exe 464 QQ.exe 2128 svchost.exe 464 QQ.exe 2128 svchost.exe 464 QQ.exe 2128 svchost.exe 464 QQ.exe 2128 svchost.exe 464 QQ.exe 2128 svchost.exe 464 QQ.exe 2128 svchost.exe 464 QQ.exe 11088 Kvzbtbs.exe 11088 Kvzbtbs.exe 464 QQ.exe 2128 svchost.exe 11088 Kvzbtbs.exe 464 QQ.exe 2128 svchost.exe 11088 Kvzbtbs.exe 464 QQ.exe 2128 svchost.exe 11088 Kvzbtbs.exe 464 QQ.exe 2128 svchost.exe 11088 Kvzbtbs.exe 464 QQ.exe 2128 svchost.exe 11088 Kvzbtbs.exe 464 QQ.exe 2128 svchost.exe 11088 Kvzbtbs.exe 464 QQ.exe 2128 svchost.exe 11088 Kvzbtbs.exe 464 QQ.exe 2128 svchost.exe 464 QQ.exe 2128 svchost.exe 464 QQ.exe 2128 svchost.exe 464 QQ.exe 2128 svchost.exe 464 QQ.exe 2128 svchost.exe 464 QQ.exe 2128 svchost.exe 464 QQ.exe 2128 svchost.exe 464 QQ.exe 2128 svchost.exe 464 QQ.exe -
Drops file in Program Files directory 2 IoCs
Processes:
QQ.exedescription ioc Process File created C:\Program Files (x86)\Kvzbtbs.exe QQ.exe File opened for modification C:\Program Files (x86)\Kvzbtbs.exe QQ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 24 IoCs
Processes:
Kvzbtbs.exedescription ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Kvzbtbs.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7F2BADBE-1F1F-469B-9402-44032053C556}\3e-42-5b-7c-66-6e Kvzbtbs.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-42-5b-7c-66-6e\WpadDecision = "0" Kvzbtbs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Kvzbtbs.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Kvzbtbs.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7F2BADBE-1F1F-469B-9402-44032053C556}\WpadDecisionTime = 202a4e890e99da01 Kvzbtbs.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7F2BADBE-1F1F-469B-9402-44032053C556}\WpadDecision = "0" Kvzbtbs.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7F2BADBE-1F1F-469B-9402-44032053C556}\WpadNetworkName = "Network 3" Kvzbtbs.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-42-5b-7c-66-6e Kvzbtbs.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Kvzbtbs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Kvzbtbs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Kvzbtbs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Kvzbtbs.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Kvzbtbs.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7F2BADBE-1F1F-469B-9402-44032053C556} Kvzbtbs.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-42-5b-7c-66-6e\WpadDecisionTime = 202a4e890e99da01 Kvzbtbs.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-42-5b-7c-66-6e\WpadDecisionReason = "1" Kvzbtbs.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Kvzbtbs.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Kvzbtbs.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Kvzbtbs.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Kvzbtbs.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Kvzbtbs.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00e1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Kvzbtbs.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7F2BADBE-1F1F-469B-9402-44032053C556}\WpadDecisionReason = "1" Kvzbtbs.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
svchost.exepid Process 2128 svchost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
2024-04-28_d6c0cf36d24f9c78d3e9c62c1ab10d7a_icedid.exesvchost.exepid Process 2912 2024-04-28_d6c0cf36d24f9c78d3e9c62c1ab10d7a_icedid.exe 2912 2024-04-28_d6c0cf36d24f9c78d3e9c62c1ab10d7a_icedid.exe 2128 svchost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
2024-04-28_d6c0cf36d24f9c78d3e9c62c1ab10d7a_icedid.exedescription pid Process procid_target PID 2912 wrote to memory of 464 2912 2024-04-28_d6c0cf36d24f9c78d3e9c62c1ab10d7a_icedid.exe 28 PID 2912 wrote to memory of 464 2912 2024-04-28_d6c0cf36d24f9c78d3e9c62c1ab10d7a_icedid.exe 28 PID 2912 wrote to memory of 464 2912 2024-04-28_d6c0cf36d24f9c78d3e9c62c1ab10d7a_icedid.exe 28 PID 2912 wrote to memory of 464 2912 2024-04-28_d6c0cf36d24f9c78d3e9c62c1ab10d7a_icedid.exe 28 PID 2912 wrote to memory of 2128 2912 2024-04-28_d6c0cf36d24f9c78d3e9c62c1ab10d7a_icedid.exe 29 PID 2912 wrote to memory of 2128 2912 2024-04-28_d6c0cf36d24f9c78d3e9c62c1ab10d7a_icedid.exe 29 PID 2912 wrote to memory of 2128 2912 2024-04-28_d6c0cf36d24f9c78d3e9c62c1ab10d7a_icedid.exe 29 PID 2912 wrote to memory of 2128 2912 2024-04-28_d6c0cf36d24f9c78d3e9c62c1ab10d7a_icedid.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_d6c0cf36d24f9c78d3e9c62c1ab10d7a_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-28_d6c0cf36d24f9c78d3e9c62c1ab10d7a_icedid.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Roaming\QQ.exe"C:\Users\Admin\AppData\Roaming\QQ.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
PID:464
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2128
-
-
C:\Program Files (x86)\Kvzbtbs.exe"C:\Program Files (x86)\Kvzbtbs.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies data under HKEY_USERS
PID:11088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
936KB
MD5f21c518bcafa5fe911f17ffb3c1797b0
SHA16ddf4338b8802ed0e698af6d78695cc12d7e55d6
SHA256a64ace959b459d7f23ceb7b2ff1cbe7f9346e3aa412118d4078b940e13b087a8
SHA512482a3c93ed737da332be810d543a2afd274b6c20ebcdccf4a324cca756629ffcd402c7ba5b514ad19f91bb27ecdc3de0e3baa30f65658c1f152ad1bcc9f8f25f
-
Filesize
1.6MB
MD5e10f2fe129e169b2ac1ce9eeb179c15f
SHA1bf6b5ac1c98b04b2b881522b10277efa4acb72b5
SHA2561419f75027c186e8024396999a6841e6bbbcec531d134f8f26491a0fca9715a0
SHA512590e3c4ddb764ae2764b74f9f6283c7b3635c1dfaf42e3c80b90a2bf71b66b2cff2d5f1519c28965dcbf07152766f28fc827f140cedf3547a5985e4d755cac83