Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 09:30
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-27_6f44c2c2b3f4a1d0efef09c77f9fd3fa_icedid.exe
Resource
win7-20240611-en
General
-
Target
2024-06-27_6f44c2c2b3f4a1d0efef09c77f9fd3fa_icedid.exe
-
Size
2.8MB
-
MD5
6f44c2c2b3f4a1d0efef09c77f9fd3fa
-
SHA1
f4fc2bdd050e2d55ea65b7dc62dd36f1237b0b3a
-
SHA256
90c2e7f7c341bb8ce0ba1c32e86ec36b6ebc12a24cd546e6f35e9f733769fef4
-
SHA512
195a1bdb5bbd9c06d53fcdf0c8683d979f5a56b6573a0f9f496e2dd269a3b49cb67b31eee34263893cda71dfcb4ef13b7052420aa0062292b0aa60564136d385
-
SSDEEP
49152:IQZAdVyVT9n/Gg0P+WhoohwjEkvv/UOLq1ZXjIf+Fr42+mrU:hGdVyVT9nOgmhkQkvvsWq1ZXJm25I
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3728-6-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3728-10-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3728-7-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3276-16-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3276-15-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2916-40-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2916-43-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2916-32-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3276-29-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2916-45-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3276-19-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 12 IoCs
resource yara_rule behavioral2/memory/3728-6-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3728-10-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3728-7-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3276-16-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3276-15-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/files/0x0007000000023416-35.dat family_gh0strat behavioral2/memory/2916-40-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2916-43-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2916-32-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3276-29-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2916-45-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3276-19-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatforn.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ö÷¶¯·ÀÓù·þÎñÄ£¿é\Parameters\ServiceDll = "C:\\Windows\\system32\\240598406.txt" svchos.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatforn.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Control Panel\International\Geo\Nation HD_2024-06-27_6f44c2c2b3f4a1d0efef09c77f9fd3fa_icedid.exe -
Executes dropped EXE 6 IoCs
pid Process 3728 svchost.exe 3276 TXPlatforn.exe 5076 svchos.exe 2916 TXPlatforn.exe 4888 HD_2024-06-27_6f44c2c2b3f4a1d0efef09c77f9fd3fa_icedid.exe 4228 Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe -
Loads dropped DLL 3 IoCs
pid Process 5076 svchos.exe 2404 svchost.exe 4228 Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe -
resource yara_rule behavioral2/memory/3728-6-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3728-4-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3728-10-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3728-7-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3276-13-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3276-16-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3276-15-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2916-40-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2916-43-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2916-32-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3276-29-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2916-45-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3276-19-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ini.ini svchos.exe File created C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe svchost.exe File opened for modification C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe svchost.exe File created C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe File created C:\Windows\SysWOW64\240598406.txt svchos.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe 2024-06-27_6f44c2c2b3f4a1d0efef09c77f9fd3fa_icedid.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe 2024-06-27_6f44c2c2b3f4a1d0efef09c77f9fd3fa_icedid.exe File created C:\Program Files (x86)\Google\Chrome\Application\chrome.exe 2024-06-27_6f44c2c2b3f4a1d0efef09c77f9fd3fa_icedid.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe 2024-06-27_6f44c2c2b3f4a1d0efef09c77f9fd3fa_icedid.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe 2024-06-27_6f44c2c2b3f4a1d0efef09c77f9fd3fa_icedid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{FBFB3044-3467-11EF-8383-5AE3054E25D0} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31115380" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31115380" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3498450067" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3496263108" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000be8d09d2f4d11c4d818ffc378a08810100000000020000000000106600000001000020000000281f8502c2f7e99279bf84717013595a51bf19be81c9f535ef21d087231bd623000000000e80000000020000200000005308801b1fa81989b898dc4b7b7f208e083420c4c3355bca1cbdb2871b02d7a320000000a7c51de843d1e7fa116b2404f0e91b374dcaf622cd16f1ac4a6176e0c877453d400000003ce46afded2b481f509ab809a1c3f896133d694a0243c84b9ec45905a64eb9e6769063f644f54c1cde74521ead2396f864b8869687e5c4cd801aee8a560f6969 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31115380" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31115380" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 406221e674c8da01 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000be8d09d2f4d11c4d818ffc378a08810100000000020000000000106600000001000020000000d38d80253c0d28348e01aeb03958eacda98c02524e559d5bc79f9c3a7077901b000000000e800000000200002000000079cad5ad403b9c7e793aef73cb0cc24d03094e20611010287ca7f903849b5ba1200000006262bf0068b5c415c63b28fa97e3362c7bacc0b12d1b71a4efd1f0617c805d8840000000866974c177732ad32cbd35e7a665d8018326cee85e89d66ff59ee7251bff8f080652566a7f99b755e1975591a51911753dea4bf10eb1dc400feb2170f32b5c6d IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3498450067" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426245643" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3496263108" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 301d26e674c8da01 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2140 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4380 2024-06-27_6f44c2c2b3f4a1d0efef09c77f9fd3fa_icedid.exe 4380 2024-06-27_6f44c2c2b3f4a1d0efef09c77f9fd3fa_icedid.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2916 TXPlatforn.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3728 svchost.exe Token: SeLoadDriverPrivilege 2916 TXPlatforn.exe Token: 33 2916 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 2916 TXPlatforn.exe Token: 33 2916 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 2916 TXPlatforn.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5020 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4380 2024-06-27_6f44c2c2b3f4a1d0efef09c77f9fd3fa_icedid.exe 4380 2024-06-27_6f44c2c2b3f4a1d0efef09c77f9fd3fa_icedid.exe 5020 IEXPLORE.EXE 5020 IEXPLORE.EXE 4488 IEXPLORE.EXE 4488 IEXPLORE.EXE 4488 IEXPLORE.EXE 4488 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4380 wrote to memory of 3728 4380 2024-06-27_6f44c2c2b3f4a1d0efef09c77f9fd3fa_icedid.exe 83 PID 4380 wrote to memory of 3728 4380 2024-06-27_6f44c2c2b3f4a1d0efef09c77f9fd3fa_icedid.exe 83 PID 4380 wrote to memory of 3728 4380 2024-06-27_6f44c2c2b3f4a1d0efef09c77f9fd3fa_icedid.exe 83 PID 3728 wrote to memory of 1132 3728 svchost.exe 85 PID 3728 wrote to memory of 1132 3728 svchost.exe 85 PID 3728 wrote to memory of 1132 3728 svchost.exe 85 PID 4380 wrote to memory of 5076 4380 2024-06-27_6f44c2c2b3f4a1d0efef09c77f9fd3fa_icedid.exe 87 PID 4380 wrote to memory of 5076 4380 2024-06-27_6f44c2c2b3f4a1d0efef09c77f9fd3fa_icedid.exe 87 PID 4380 wrote to memory of 5076 4380 2024-06-27_6f44c2c2b3f4a1d0efef09c77f9fd3fa_icedid.exe 87 PID 3276 wrote to memory of 2916 3276 TXPlatforn.exe 88 PID 3276 wrote to memory of 2916 3276 TXPlatforn.exe 88 PID 3276 wrote to memory of 2916 3276 TXPlatforn.exe 88 PID 1132 wrote to memory of 2140 1132 cmd.exe 92 PID 1132 wrote to memory of 2140 1132 cmd.exe 92 PID 1132 wrote to memory of 2140 1132 cmd.exe 92 PID 4380 wrote to memory of 4888 4380 2024-06-27_6f44c2c2b3f4a1d0efef09c77f9fd3fa_icedid.exe 91 PID 4380 wrote to memory of 4888 4380 2024-06-27_6f44c2c2b3f4a1d0efef09c77f9fd3fa_icedid.exe 91 PID 4380 wrote to memory of 4888 4380 2024-06-27_6f44c2c2b3f4a1d0efef09c77f9fd3fa_icedid.exe 91 PID 2404 wrote to memory of 4228 2404 svchost.exe 98 PID 2404 wrote to memory of 4228 2404 svchost.exe 98 PID 2404 wrote to memory of 4228 2404 svchost.exe 98 PID 4888 wrote to memory of 2176 4888 HD_2024-06-27_6f44c2c2b3f4a1d0efef09c77f9fd3fa_icedid.exe 101 PID 4888 wrote to memory of 2176 4888 HD_2024-06-27_6f44c2c2b3f4a1d0efef09c77f9fd3fa_icedid.exe 101 PID 4888 wrote to memory of 2176 4888 HD_2024-06-27_6f44c2c2b3f4a1d0efef09c77f9fd3fa_icedid.exe 101 PID 2176 wrote to memory of 5020 2176 iexplore.exe 102 PID 2176 wrote to memory of 5020 2176 iexplore.exe 102 PID 5020 wrote to memory of 4488 5020 IEXPLORE.EXE 103 PID 5020 wrote to memory of 4488 5020 IEXPLORE.EXE 103 PID 5020 wrote to memory of 4488 5020 IEXPLORE.EXE 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_6f44c2c2b3f4a1d0efef09c77f9fd3fa_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-27_6f44c2c2b3f4a1d0efef09c77f9fd3fa_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\\svchost.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\svchost.exe > nul3⤵
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:2140
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchos.exeC:\Users\Admin\AppData\Local\Temp\\svchos.exe2⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:5076
-
-
C:\Users\Admin\AppData\Local\Temp\HD_2024-06-27_6f44c2c2b3f4a1d0efef09c77f9fd3fa_icedid.exeC:\Users\Admin\AppData\Local\Temp\HD_2024-06-27_6f44c2c2b3f4a1d0efef09c77f9fd3fa_icedid.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://se.360.cn/3⤵
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://se.360.cn/4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5020 CREDAT:17410 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4488
-
-
-
-
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2916
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñÄ£¿é"1⤵PID:3636
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñÄ£¿é"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exeC:\Windows\system32\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe "c:\windows\system32\240598406.txt",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
1.6MB
MD5da93f7babf05071a855ac582cda82225
SHA1032f424fe65ed67089cce3a0edaa7a489c14d5c9
SHA256276f97f383871a04b88a545c5aedc47657667c1c55ed53a9507fdacfa32781e0
SHA512476252a073fb1d864a1991272a3ece4b6c5dfdbacc25d47d17fa78640ef7eb304f00f7df3ed106840ab7d63ba679f4de50704faf0b66b1b888a5134c1ce0e071
-
Filesize
1.2MB
MD5b64849f43990c9963c0cd91459d61dda
SHA1cfb53aaa0a7ad8b8c42cfcdc7bc09542e2c35954
SHA256af31eea36bf31a764259608d0b7b5ff21cba64ef2a3b5390ef7754de7dd4e53e
SHA512a9a5c1bdbf3f1ed7c10eee599d3191b0431db75774c72fadd889170993299b4aeae8b9570d52bc98399c514a150a9c1c285b4806e126fe417aea70100a2db1b5
-
Filesize
93KB
MD53b377ad877a942ec9f60ea285f7119a2
SHA160b23987b20d913982f723ab375eef50fafa6c70
SHA25662954fdf65e629b39a29f539619d20691332184c6b6be5a826128a8e759bfa84
SHA512af3a71f867ad9d28772c48b521097f9bf8931eb89fd2974e8de10990241419a39ddc3c0b36dd38aac4fdf14e1f0c5e228692618e93adce958d5b5dab8940e46f
-
Filesize
377KB
MD5a4329177954d4104005bce3020e5ef59
SHA123c29e295e2dbb8454012d619ca3f81e4c16e85a
SHA2566156d003d54dcf2ee92f21bd6e7a6a7f91730bd2804381260bcabe465abe6ddd
SHA51281e9d456a4abfc7cd9e0943d4a0ce15523362c3179f3368381d1d7974f80a9f9113b5404b96e67e91684e0ea1895b7d0073e4c48d0bfc4fd0244b1af6acf0208
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
50KB
MD5229960be8bcb0ca7c3711c65ffca0775
SHA1d66392a1cec7d9b7028ce0281b9382bba3f06ab2
SHA2562d8c1ad76ae85e2e8ef5f6c602b58baa51a0942de08a7f2ed4a4617712215c90
SHA512ee9a060ea7d7523f4a97d874b57ed2f7b9686f9c5855dc40ba4edf78b5e49d936b463acbca8e8b0ca468de677e7d71ae142e733fab4b8be1cb28a610fe61679c