Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10/06/2024, 11:48
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe
-
Size
38.4MB
-
MD5
b98fd82d30fb5972bedcfe490d82bf61
-
SHA1
7a4e98c13d7fad348d408c7904c1c0c248803340
-
SHA256
febf2ca4d433c5cf54c65aa7c7e09e1d2afc443bada2ff9773f7d8e5812e9f65
-
SHA512
9400d5e3dd844a472dd991101ed63e6ef26fd665ed7f0cdebea1a3a3598aa138651aac651eebc63f8221c7a1290ea720668189b2c7247af62fe5ca4b58d649d3
-
SSDEEP
786432:CejfTZH3PqRky+Ywd/mrVioPL4KhXXVVuVoB/SK2sv:fjbZXPImuU8EKV6C
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule behavioral1/memory/2704-119-0x0000000000400000-0x0000000003DED000-memory.dmp UPX -
Executes dropped EXE 2 IoCs
pid Process 2704 Launcher.exe 2356 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe -
Loads dropped DLL 10 IoCs
pid Process 2228 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe 2228 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe 2228 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe 2228 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe 2228 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe 2228 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe 2928 MsiExec.exe 2704 Launcher.exe 2356 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe 2356 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 5 2928 MsiExec.exe 6 2928 MsiExec.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 2356 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe 2356 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe 2356 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe 2356 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe 2356 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe 2356 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe -
Drops file in Program Files directory 44 IoCs
description ioc Process File created C:\Program Files (x86)\Metadata1\---d-¦+¦+++¿_BetaLang.jpg 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe File created C:\Program Files (x86)\Metadata1\Launcher.exe 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe File created C:\Program Files (x86)\Skins\SLAppAssets89.to 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe File created C:\Program Files (x86)\Metadata1\IAC.zip 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe File opened for modification C:\Program Files (x86)\Metadata1\msvcp140_codecvt_ids.dll 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe File opened for modification C:\Program Files (x86)\Metadata1\api-ms-win-crt-heap-l1-1-0.dll 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe File created C:\Program Files (x86)\Metadata1\Uninstall.exe 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe File opened for modification C:\Program Files (x86)\Metadata1\---d-¦+¦+++¿_BetaLang.jpg 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe File created C:\Program Files (x86)\Skins\SLCoreAssets243.to 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe File opened for modification C:\Program Files (x86)\Metadata1\concrt140.dll 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe File created C:\Program Files (x86)\Metadata1\msvcp140_codecvt_ids.dll 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe File opened for modification C:\Program Files (x86)\Metadata1\vcruntime140.dll 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe File opened for modification C:\Program Files (x86)\Metadata1\IAC.zip 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe File created C:\Program Files (x86)\Metadata1\AntiCheat.dll 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe File opened for modification C:\Program Files (x86)\Metadata1\api-ms-win-crt-stdio-l1-1-0.dll 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe File created C:\Program Files (x86)\Metadata1\IAC.Base.dat 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe File created C:\Program Files (x86)\Skins\SLCoreAssetsEx243.to 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe File created C:\Program Files (x86)\Skins\Package_114842.zip 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe File created C:\Program Files (x86)\Metadata1\ExuiKrnln_Win64.lib Launcher.exe File created C:\Program Files (x86)\Metadata1\1C0A0B0C120F156D155B15B0A0F160A0C160F.exe Launcher.exe File opened for modification C:\Program Files (x86)\Metadata1\ExuiKrnln_Win64.lib Launcher.exe File opened for modification C:\Program Files (x86)\Metadata1\api-ms-win-crt-string-l1-1-0.dll 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe File opened for modification C:\Program Files (x86)\Metadata1\msvcp140.dll 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe File opened for modification C:\Program Files (x86)\Metadata1\msvcp140_atomic_wait.dll 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe File opened for modification C:\Program Files (x86)\Metadata1\Uninstall.exe 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe File created C:\Program Files (x86)\Metadata1\BetaLang.jpg 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe File opened for modification C:\Program Files (x86)\Metadata1\ExuiKrnln_Win32.lib Launcher.exe File created C:\Program Files (x86)\Metadata1\msvcp140_atomic_wait.dll 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe File created C:\Program Files (x86)\Metadata1\api-ms-win-crt-heap-l1-1-0.dll 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe File opened for modification C:\Program Files (x86)\Metadata1\IAC.Base.dat 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe File opened for modification C:\Program Files (x86)\Metadata1\api-ms-win-crt-runtime-l1-1-0.dll 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe File opened for modification C:\Program Files (x86)\Metadata1\BetaLang.jpg 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe File created C:\Program Files (x86)\Metadata1\ExuiKrnln_Win32.lib Launcher.exe File opened for modification C:\Program Files (x86)\Metadata1\1C0A0B0C120F156D155B15B0A0F160A0C160F.exe Launcher.exe File created C:\Program Files (x86)\Metadata1\api-ms-win-crt-string-l1-1-0.dll 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe File created C:\Program Files (x86)\Metadata1\msvcp140.dll 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe File created C:\Program Files (x86)\Metadata1\vcruntime140.dll 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe File opened for modification C:\Program Files (x86)\Metadata1\api-ms-win-crt-math-l1-1-0.dll 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe File created C:\Program Files (x86)\Metadata1\api-ms-win-crt-stdio-l1-1-0.dll 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe File opened for modification C:\Program Files (x86)\Metadata1\Launcher.exe 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe File opened for modification C:\Program Files (x86)\Metadata1\AntiCheat.dll 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe File created C:\Program Files (x86)\Metadata1\concrt140.dll 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe File created C:\Program Files (x86)\Metadata1\api-ms-win-crt-math-l1-1-0.dll 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe File created C:\Program Files (x86)\Metadata1\api-ms-win-crt-runtime-l1-1-0.dll 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\wusa.lock wusa.exe File opened for modification C:\Windows\Logs\DPX\setupact.log wusa.exe File opened for modification C:\Windows\WindowsUpdate.log wusa.exe File opened for modification C:\Windows\Installer\f765adc.msi msiexec.exe File created C:\Windows\Installer\f765adf.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI676C.tmp msiexec.exe File opened for modification C:\Windows\Installer\f765adf.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI6943.tmp msiexec.exe File created C:\Windows\wusa.lock wusa.exe File opened for modification C:\Windows\Logs\DPX\setuperr.log wusa.exe File created C:\Windows\Installer\f765adc.msi msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 2228 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe 2568 msiexec.exe 2568 msiexec.exe 2704 Launcher.exe 2704 Launcher.exe 2704 Launcher.exe 2704 Launcher.exe 2704 Launcher.exe 2704 Launcher.exe 2704 Launcher.exe 2704 Launcher.exe 2356 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe 2356 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe 2356 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe 2356 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe 2356 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe 2356 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe 2356 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe 2356 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeShutdownPrivilege 2524 msiexec.exe Token: SeIncreaseQuotaPrivilege 2524 msiexec.exe Token: SeRestorePrivilege 2568 msiexec.exe Token: SeTakeOwnershipPrivilege 2568 msiexec.exe Token: SeSecurityPrivilege 2568 msiexec.exe Token: SeCreateTokenPrivilege 2524 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2524 msiexec.exe Token: SeLockMemoryPrivilege 2524 msiexec.exe Token: SeIncreaseQuotaPrivilege 2524 msiexec.exe Token: SeMachineAccountPrivilege 2524 msiexec.exe Token: SeTcbPrivilege 2524 msiexec.exe Token: SeSecurityPrivilege 2524 msiexec.exe Token: SeTakeOwnershipPrivilege 2524 msiexec.exe Token: SeLoadDriverPrivilege 2524 msiexec.exe Token: SeSystemProfilePrivilege 2524 msiexec.exe Token: SeSystemtimePrivilege 2524 msiexec.exe Token: SeProfSingleProcessPrivilege 2524 msiexec.exe Token: SeIncBasePriorityPrivilege 2524 msiexec.exe Token: SeCreatePagefilePrivilege 2524 msiexec.exe Token: SeCreatePermanentPrivilege 2524 msiexec.exe Token: SeBackupPrivilege 2524 msiexec.exe Token: SeRestorePrivilege 2524 msiexec.exe Token: SeShutdownPrivilege 2524 msiexec.exe Token: SeDebugPrivilege 2524 msiexec.exe Token: SeAuditPrivilege 2524 msiexec.exe Token: SeSystemEnvironmentPrivilege 2524 msiexec.exe Token: SeChangeNotifyPrivilege 2524 msiexec.exe Token: SeRemoteShutdownPrivilege 2524 msiexec.exe Token: SeUndockPrivilege 2524 msiexec.exe Token: SeSyncAgentPrivilege 2524 msiexec.exe Token: SeEnableDelegationPrivilege 2524 msiexec.exe Token: SeManageVolumePrivilege 2524 msiexec.exe Token: SeImpersonatePrivilege 2524 msiexec.exe Token: SeCreateGlobalPrivilege 2524 msiexec.exe Token: SeRestorePrivilege 2568 msiexec.exe Token: SeTakeOwnershipPrivilege 2568 msiexec.exe Token: SeRestorePrivilege 2568 msiexec.exe Token: SeTakeOwnershipPrivilege 2568 msiexec.exe Token: SeRestorePrivilege 2568 msiexec.exe Token: SeTakeOwnershipPrivilege 2568 msiexec.exe Token: SeRestorePrivilege 2568 msiexec.exe Token: SeTakeOwnershipPrivilege 2568 msiexec.exe Token: SeRestorePrivilege 2568 msiexec.exe Token: SeTakeOwnershipPrivilege 2568 msiexec.exe Token: SeRestorePrivilege 2568 msiexec.exe Token: SeTakeOwnershipPrivilege 2568 msiexec.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2228 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe 2228 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe 2704 Launcher.exe 2704 Launcher.exe 2356 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe 2356 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2356 1C0A0B0C120F156D155B15B0A0F160A0C160F.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2564 2228 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe 29 PID 2228 wrote to memory of 2564 2228 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe 29 PID 2228 wrote to memory of 2564 2228 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe 29 PID 2228 wrote to memory of 2564 2228 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe 29 PID 2228 wrote to memory of 2704 2228 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe 30 PID 2228 wrote to memory of 2704 2228 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe 30 PID 2228 wrote to memory of 2704 2228 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe 30 PID 2228 wrote to memory of 2704 2228 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe 30 PID 2228 wrote to memory of 2704 2228 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe 30 PID 2228 wrote to memory of 2704 2228 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe 30 PID 2228 wrote to memory of 2704 2228 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe 30 PID 2228 wrote to memory of 2524 2228 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe 31 PID 2228 wrote to memory of 2524 2228 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe 31 PID 2228 wrote to memory of 2524 2228 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe 31 PID 2228 wrote to memory of 2524 2228 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe 31 PID 2228 wrote to memory of 2524 2228 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe 31 PID 2228 wrote to memory of 2524 2228 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe 31 PID 2228 wrote to memory of 2524 2228 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe 31 PID 2228 wrote to memory of 3008 2228 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe 35 PID 2228 wrote to memory of 3008 2228 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe 35 PID 2228 wrote to memory of 3008 2228 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe 35 PID 2228 wrote to memory of 3008 2228 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe 35 PID 2228 wrote to memory of 3008 2228 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe 35 PID 2228 wrote to memory of 3008 2228 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe 35 PID 2228 wrote to memory of 3008 2228 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe 35 PID 2228 wrote to memory of 2820 2228 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe 37 PID 2228 wrote to memory of 2820 2228 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe 37 PID 2228 wrote to memory of 2820 2228 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe 37 PID 2228 wrote to memory of 2820 2228 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe 37 PID 2228 wrote to memory of 2820 2228 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe 37 PID 2228 wrote to memory of 2820 2228 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe 37 PID 2228 wrote to memory of 2820 2228 2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe 37 PID 2568 wrote to memory of 2928 2568 msiexec.exe 38 PID 2568 wrote to memory of 2928 2568 msiexec.exe 38 PID 2568 wrote to memory of 2928 2568 msiexec.exe 38 PID 2568 wrote to memory of 2928 2568 msiexec.exe 38 PID 2568 wrote to memory of 2928 2568 msiexec.exe 38 PID 2568 wrote to memory of 2928 2568 msiexec.exe 38 PID 2568 wrote to memory of 2928 2568 msiexec.exe 38 PID 2568 wrote to memory of 920 2568 msiexec.exe 39 PID 2568 wrote to memory of 920 2568 msiexec.exe 39 PID 2568 wrote to memory of 920 2568 msiexec.exe 39 PID 2568 wrote to memory of 920 2568 msiexec.exe 39 PID 2568 wrote to memory of 920 2568 msiexec.exe 39 PID 2704 wrote to memory of 2356 2704 Launcher.exe 41 PID 2704 wrote to memory of 2356 2704 Launcher.exe 41 PID 2704 wrote to memory of 2356 2704 Launcher.exe 41 PID 2704 wrote to memory of 2356 2704 Launcher.exe 41 PID 2704 wrote to memory of 2356 2704 Launcher.exe 41 PID 2704 wrote to memory of 2356 2704 Launcher.exe 41 PID 2704 wrote to memory of 2356 2704 Launcher.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-10_b98fd82d30fb5972bedcfe490d82bf61_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe" "C:\Program Files (x86)\Metadata1\BetaLang.jpg"2⤵PID:2564
-
-
C:\Program Files (x86)\Metadata1\Launcher.exe"C:\Program Files (x86)\Metadata1\Launcher.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Program Files (x86)\Metadata1\1C0A0B0C120F156D155B15B0A0F160A0C160F.exe"C:\Program Files (x86)\Metadata1\1C0A0B0C120F156D155B15B0A0F160A0C160F.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
PID:2356
-
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i C:\Users\Admin\AppData\Local\Temp\timeweii.msi /q /norestart2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2524
-
-
C:\Windows\SysWOW64\wusa.exewusa.exe C:\Users\Admin\AppData\Local\Temp\timeweii.msix64.msu /quiet /norestart2⤵
- Drops file in Windows directory
PID:3008
-
-
C:\Windows\SysWOW64\wusa.exewusa.exe C:\Users\Admin\AppData\Local\Temp\timeweii.msix86.msu /quiet /norestart2⤵
- Drops file in Windows directory
PID:2820
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:2592
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 9624C786A7853142A3E15E81C9C0E9862⤵
- Loads dropped DLL
- Blocklisted process makes network request
PID:2928
-
-
C:\Windows\system32\MsiExec.exeC:\Windows\system32\MsiExec.exe -Embedding F78E151CC0F3D98540A03E54F6C203272⤵PID:920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
608B
MD541a833ca5ebd8aede3367b137299e5fa
SHA15d49d27ccb1b807448ee3bc757a99ec880fe15d2
SHA25699d1dd7d530cce1ff638c0bb0e2f43188577982f00d3454346fd509e30e3b658
SHA512409164e05d116aac8fe34df2d928d63dae39e680fe98d55df6070c948bf5a77a4bf4839a454d9e0d43489bc21c9a0343f83ef02fc6ce7b50bab681292982e8fd
-
Filesize
1.3MB
MD54f2b40a72f89837ee39b7af2e33dd672
SHA169346069bd65fd33d9097c13f782b749a23c44af
SHA256bb7be0935d6fa554fc1daf7db4502c65a27ffaaf26639214bf7ef370f99b9cf3
SHA51238a23da435c3f065a2ad6c5166863a12486aba361f3e758551e5cb44980d30b575ab184ef0f7675e634ab58257b25e2ae09eb57f79dd826a7080dfd63cebec44
-
Filesize
1.8MB
MD5dbaf95ed9bf6b9ffa44bdf46043e20e7
SHA14c08a8def960a9a391c0415d4c3d7c96e0cfb8a9
SHA256d4bc06e86279869af83c89728bb7a057de640e9ff6ba0ba03804732a0eae9a07
SHA5126105ea4ff6a2b2d301d6796a2533cabe70b96c59f66b2d9a73ad79513baee5aedf4fae7b4c526ef81a5062d7450adb934126a8879b5ad6ba41ef4c5df5668ad1
-
Filesize
1.2MB
MD5ce6bfaef90f6a5365c37b07e65eb9264
SHA18b11f826932a5444067399c3c48720a91e9ffeb7
SHA256f55b3aab50ce0d22cc3ec504f17a9bdb5a8840263e10209c12b3beddb12ab2eb
SHA512c9a57c3835b628cd7612f29172ad571c67ace5d8614133e7c951becc3b0386cbd07a467b95dab90fd731dadd7110aa0380de94280956c1238326586eb0de4749
-
Filesize
796KB
MD5c7a9ad8a726a867ce85803519c16c4ec
SHA15b067ffb69a94a6e5f9da89ce88c658e52a0dec0
SHA256bc35e63a125eb2dce45971bedc7ef8a78706b7e26286aed0cf664999ad833eda
SHA5125fa087c4ba5d7173506de8fa0761f3c4d76395eb6ea0ff8d4dfa31ba90b2ee9f6a3387191452c69122623616faf95448827cfd7cc7cb76a807912177e0cc0773
-
Filesize
78KB
MD5f3be41747464ed10a17ead59d5ed8ea1
SHA1dbfa1aa59ddb7e2b051036e6a57ed8ff3f1c1e0e
SHA2560d206debd16abd95a0dae3a9d9578860f5c917f9342a23ee7c0c024539771cca
SHA512d3ea042971594f00c33de7243193d9974975196dff835ad8125a6399fbbb5dbb3296f47fb5769454f236888b2007a931fa931a77700324c1c73ace3487e6c319
-
Filesize
27.2MB
MD51f91636c71528497d056ab7e011e17a1
SHA10cc9959dfdcfb70371b22f3b6a0ea3fe99b9d5c2
SHA2568bce73c978370dcbb16bad44e1495becbf1bee550570d094a690dcc332873ab7
SHA512a1505eabefcbfd576031f1e1412f8a82d2a76d437be62ce2dc13593e3f58ddd4eb618995b13d67243599079c888986a81c7983eb6cadf2011cf5ab7bee5d47ad
-
Filesize
3.4MB
MD5b181808a51b6a4d61039dfa7c9afdd88
SHA149cd8cff761a370e4928a1fd8257abf5c667ba99
SHA256732c0f98cd19c14b3c8ada1b19685cb63e2be8f3b97f249be0aa310fe7b2c95a
SHA512ffd4306e5301b2daade5e4d7069bd0e2914d6be2c5aed46758ba6ce2b2e39e9c6cd6315842a537cb110a36b17159299813716dbec3d5fda11d64de6fa0f53ba2
-
Filesize
27.2MB
MD50e8eacd8d2aaf7c18a64f05952549ba0
SHA1b90305652566e8e2337d65f0f522a5ed59dc77d8
SHA256276ab3ec275f3fdb76fbd32aa07b28e5c19d2f6f66b0172feb3690e6f2cab205
SHA5123d2a4b6414aa0ba4b1097d748e389d30622880796584d1bd398cad487b9fd49e4955cd79f348f4fb02ad5eb865644d0726257fe125d060b1761f1a9bf2943b5d
-
Filesize
1.7MB
MD5eade5b8fdc8ecd409087169ba5e12e38
SHA124967a0cc7046e4eef7c55be488567c7e59c6636
SHA256ef43f36aa450c01664ebd6e4566cd07287271ddd77ba58bc1418900c8a058164
SHA512cc5f68127bff66e941b0ddd78f750f1295db512e806695bad23c324b5db3d348b5d6ccab02661d25f12ffdd779fea7a03b18e00ccea86b9e4806df659bf50eff