Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-09-2024 16:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-03_1dadf47dc1b742b47f944612c15ae682_icedid.exe
Resource
win7-20240903-en
General
-
Target
2024-09-03_1dadf47dc1b742b47f944612c15ae682_icedid.exe
-
Size
562KB
-
MD5
1dadf47dc1b742b47f944612c15ae682
-
SHA1
a75f16f949233d0e29283505a16202817270f499
-
SHA256
60c8ad876547115a89694c6b5b191e9593c3ab222c3a70f247f03857c695e295
-
SHA512
7e45405d848794cc7ce984cfdca900fc3fa76142bb9513a1bf2f31644889f107d9b6b2e5df00ce3428111d1d8479961e5b1757d1205624a90d57060c8709e924
-
SSDEEP
12288:Zx1Q61iHsXYvfVpMODDawkCurdEtttY9nnA167Aw/:ZXQUIsQpMsequrmGR867j
Malware Config
Signatures
-
Trickbot x86 loader 4 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral1/memory/1644-13-0x0000000000330000-0x000000000035E000-memory.dmp trickbot_loader32 behavioral1/memory/1644-12-0x00000000002F0000-0x000000000031C000-memory.dmp trickbot_loader32 behavioral1/memory/1644-10-0x0000000000330000-0x000000000035E000-memory.dmp trickbot_loader32 behavioral1/memory/1644-16-0x0000000000330000-0x000000000035E000-memory.dmp trickbot_loader32 -
Executes dropped EXE 2 IoCs
pid Process 1644 аНаоすは래별.exe 2896 аНаоすは래별.exe -
Loads dropped DLL 2 IoCs
pid Process 2588 2024-09-03_1dadf47dc1b742b47f944612c15ae682_icedid.exe 2588 2024-09-03_1dadf47dc1b742b47f944612c15ae682_icedid.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-03_1dadf47dc1b742b47f944612c15ae682_icedid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language аНаоすは래별.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language аНаоすは래별.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 2932 svchost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2588 2024-09-03_1dadf47dc1b742b47f944612c15ae682_icedid.exe 2588 2024-09-03_1dadf47dc1b742b47f944612c15ae682_icedid.exe 1644 аНаоすは래별.exe 1644 аНаоすは래별.exe 2896 аНаоすは래별.exe 2896 аНаоすは래별.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2588 wrote to memory of 1644 2588 2024-09-03_1dadf47dc1b742b47f944612c15ae682_icedid.exe 30 PID 2588 wrote to memory of 1644 2588 2024-09-03_1dadf47dc1b742b47f944612c15ae682_icedid.exe 30 PID 2588 wrote to memory of 1644 2588 2024-09-03_1dadf47dc1b742b47f944612c15ae682_icedid.exe 30 PID 2588 wrote to memory of 1644 2588 2024-09-03_1dadf47dc1b742b47f944612c15ae682_icedid.exe 30 PID 1644 wrote to memory of 2276 1644 аНаоすは래별.exe 31 PID 1644 wrote to memory of 2276 1644 аНаоすは래별.exe 31 PID 1644 wrote to memory of 2276 1644 аНаоすは래별.exe 31 PID 1644 wrote to memory of 2276 1644 аНаоすは래별.exe 31 PID 1644 wrote to memory of 2276 1644 аНаоすは래별.exe 31 PID 1644 wrote to memory of 2276 1644 аНаоすは래별.exe 31 PID 2732 wrote to memory of 2896 2732 taskeng.exe 34 PID 2732 wrote to memory of 2896 2732 taskeng.exe 34 PID 2732 wrote to memory of 2896 2732 taskeng.exe 34 PID 2732 wrote to memory of 2896 2732 taskeng.exe 34 PID 2896 wrote to memory of 2932 2896 аНаоすは래별.exe 35 PID 2896 wrote to memory of 2932 2896 аНаоすは래별.exe 35 PID 2896 wrote to memory of 2932 2896 аНаоすは래별.exe 35 PID 2896 wrote to memory of 2932 2896 аНаоすは래별.exe 35 PID 2896 wrote to memory of 2932 2896 аНаоすは래별.exe 35 PID 2896 wrote to memory of 2932 2896 аНаоすは래별.exe 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-03_1dadf47dc1b742b47f944612c15ae682_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-03_1dadf47dc1b742b47f944612c15ae682_icedid.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\ProgramData\аНаоすは래별.exe"C:\ProgramData\аНаоすは래별.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2276
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {043C6953-CF47-4F14-84D0-8A6F70A104AE} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Roaming\NuiGet\аНаоすは래별.exeC:\Users\Admin\AppData\Roaming\NuiGet\аНаоすは래별.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2932
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
562KB
MD51dadf47dc1b742b47f944612c15ae682
SHA1a75f16f949233d0e29283505a16202817270f499
SHA25660c8ad876547115a89694c6b5b191e9593c3ab222c3a70f247f03857c695e295
SHA5127e45405d848794cc7ce984cfdca900fc3fa76142bb9513a1bf2f31644889f107d9b6b2e5df00ce3428111d1d8479961e5b1757d1205624a90d57060c8709e924