Analysis
-
max time kernel
135s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03/09/2024, 05:39
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe
-
Size
492KB
-
MD5
ebe36963867f93e1f73750c0d27c258f
-
SHA1
d01e7d1139a1898acabd4d297d31dbcf657ef051
-
SHA256
d37289ecc414dc4f70947e29ee92d2f0eaf5d23e117e880e0354fe3986dc0a60
-
SHA512
1ebba2be1cfdf6afbed38c82b62c66a22c284706757765c091a5602251b48ad0527858eacb9d4448d10bd05172a9770ea649b258a2a8b3bb40b5b007f60a9a2a
-
SSDEEP
6144:bwkhMv87Q9EFEc8FaSgbHtBxVRvYV7zL1uSb6VWi8FBo95qIGK3q0F4ZyFPp4jWw:7Pil6vRvYlzL1uSz/W5Gz
Malware Config
Signatures
-
Drops file in Drivers directory 4 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\SBREDrv.sys MsiExec.exe File opened for modification C:\Windows\system32\drivers\gfiark.sys MsiExec.exe File opened for modification C:\Windows\system32\drivers\sbapifs.sys MsiExec.exe File opened for modification C:\Windows\system32\drivers\sbaphd.sys MsiExec.exe -
Loads dropped DLL 1 IoCs
pid Process 1444 MsiExec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe File opened (read-only) \??\Z: 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\A: 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe File opened (read-only) \??\N: 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe File opened (read-only) \??\I: 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe File opened (read-only) \??\L: 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\H: 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe File opened (read-only) \??\J: 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe File opened (read-only) \??\P: 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe File opened (read-only) \??\R: 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe File opened (read-only) \??\V: 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe File opened (read-only) \??\Y: 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\B: 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe File opened (read-only) \??\K: 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe File opened (read-only) \??\T: 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\G: 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe File opened (read-only) \??\O: 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\U: 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe File opened (read-only) \??\W: 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe File opened (read-only) \??\M: 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\SBBD.EXE MsiExec.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5\Blob = 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 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5\Blob = 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 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeDebugPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeDebugPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeDebugPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeDebugPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeDebugPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeDebugPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeShutdownPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeIncreaseQuotaPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeRestorePrivilege 3008 msiexec.exe Token: SeTakeOwnershipPrivilege 3008 msiexec.exe Token: SeSecurityPrivilege 3008 msiexec.exe Token: SeCreateTokenPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeAssignPrimaryTokenPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeLockMemoryPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeIncreaseQuotaPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeMachineAccountPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeTcbPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeSecurityPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeTakeOwnershipPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeLoadDriverPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeSystemProfilePrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeSystemtimePrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeProfSingleProcessPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeIncBasePriorityPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeCreatePagefilePrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeCreatePermanentPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeBackupPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeRestorePrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeShutdownPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeDebugPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeAuditPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeSystemEnvironmentPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeChangeNotifyPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeRemoteShutdownPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeUndockPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeSyncAgentPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeEnableDelegationPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeManageVolumePrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeImpersonatePrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeCreateGlobalPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeCreateTokenPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeAssignPrimaryTokenPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeLockMemoryPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeIncreaseQuotaPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeMachineAccountPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeTcbPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeSecurityPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeTakeOwnershipPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeLoadDriverPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeSystemProfilePrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeSystemtimePrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeProfSingleProcessPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeIncBasePriorityPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeCreatePagefilePrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeCreatePermanentPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeBackupPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeRestorePrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeShutdownPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeDebugPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeAuditPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeSystemEnvironmentPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeChangeNotifyPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe Token: SeRemoteShutdownPrivilege 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe 2068 2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3008 wrote to memory of 1444 3008 msiexec.exe 33 PID 3008 wrote to memory of 1444 3008 msiexec.exe 33 PID 3008 wrote to memory of 1444 3008 msiexec.exe 33 PID 3008 wrote to memory of 1444 3008 msiexec.exe 33 PID 3008 wrote to memory of 1444 3008 msiexec.exe 33 PID 3008 wrote to memory of 1444 3008 msiexec.exe 33 PID 3008 wrote to memory of 1444 3008 msiexec.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-03_ebe36963867f93e1f73750c0d27c258f_icedid.exe"1⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2068
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 5C293CD0220F24322759277134331351 C2⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
200KB
MD5648212691fa53c7ee0896fcca371475e
SHA1c06638826dac66a8d9f3cad52c63f17865dcec81
SHA256d9c8a2cce149c40fb0414eb9268f7b23b18b2e89f982ed5fa913943df98d9898
SHA512fac1225e92e559eec7282d3183ea92df1094c55ddd598f6539cbac4a204f1988dde25272b56e9b836e861f2fcbc35a8a9d7963fcb7bdf172699960e81936aeb9
-
Filesize
31.1MB
MD5f2e40c8c6e1f8dc969a6ab537fa103dd
SHA1e566f158983e49db6482a14cc394d57d38470fc2
SHA256340503d914ce04f85d6a3f5ced3a85153f4be79f03aebe5a1dcea22276eb5c1d
SHA512012368089b6ada966fbe1b194cb468089314c2f227415de439c94098105bc848920ad3d5d2ee2eb0cdf1475921640ed79405d4727ab1a92652ae4d67f6b5d1ce
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b