Analysis
-
max time kernel
113s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-09-2024 16:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-03_1dadf47dc1b742b47f944612c15ae682_icedid.exe
Resource
win7-20240903-en
General
-
Target
2024-09-03_1dadf47dc1b742b47f944612c15ae682_icedid.exe
-
Size
562KB
-
MD5
1dadf47dc1b742b47f944612c15ae682
-
SHA1
a75f16f949233d0e29283505a16202817270f499
-
SHA256
60c8ad876547115a89694c6b5b191e9593c3ab222c3a70f247f03857c695e295
-
SHA512
7e45405d848794cc7ce984cfdca900fc3fa76142bb9513a1bf2f31644889f107d9b6b2e5df00ce3428111d1d8479961e5b1757d1205624a90d57060c8709e924
-
SSDEEP
12288:Zx1Q61iHsXYvfVpMODDawkCurdEtttY9nnA167Aw/:ZXQUIsQpMsequrmGR867j
Malware Config
Signatures
-
Trickbot x86 loader 6 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/2196-14-0x0000000002670000-0x000000000269E000-memory.dmp trickbot_loader32 behavioral2/memory/2196-13-0x0000000002640000-0x000000000266C000-memory.dmp trickbot_loader32 behavioral2/memory/2196-11-0x0000000002670000-0x000000000269E000-memory.dmp trickbot_loader32 behavioral2/memory/2196-17-0x0000000002670000-0x000000000269E000-memory.dmp trickbot_loader32 behavioral2/memory/1800-26-0x0000000000E60000-0x0000000000E8E000-memory.dmp trickbot_loader32 behavioral2/memory/1800-29-0x0000000000E60000-0x0000000000E8E000-memory.dmp trickbot_loader32 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation 2024-09-03_1dadf47dc1b742b47f944612c15ae682_icedid.exe -
Executes dropped EXE 2 IoCs
pid Process 2196 аНаоすは래별.exe 1800 аНаоすは래별.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-03_1dadf47dc1b742b47f944612c15ae682_icedid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language аНаоすは래별.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language аНаоすは래별.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 3312 svchost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1748 2024-09-03_1dadf47dc1b742b47f944612c15ae682_icedid.exe 1748 2024-09-03_1dadf47dc1b742b47f944612c15ae682_icedid.exe 2196 аНаоすは래별.exe 2196 аНаоすは래별.exe 1800 аНаоすは래별.exe 1800 аНаоすは래별.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1748 wrote to memory of 2196 1748 2024-09-03_1dadf47dc1b742b47f944612c15ae682_icedid.exe 83 PID 1748 wrote to memory of 2196 1748 2024-09-03_1dadf47dc1b742b47f944612c15ae682_icedid.exe 83 PID 1748 wrote to memory of 2196 1748 2024-09-03_1dadf47dc1b742b47f944612c15ae682_icedid.exe 83 PID 2196 wrote to memory of 4696 2196 аНаоすは래별.exe 92 PID 2196 wrote to memory of 4696 2196 аНаоすは래별.exe 92 PID 2196 wrote to memory of 4696 2196 аНаоすは래별.exe 92 PID 2196 wrote to memory of 4696 2196 аНаоすは래별.exe 92 PID 1800 wrote to memory of 3312 1800 аНаоすは래별.exe 99 PID 1800 wrote to memory of 3312 1800 аНаоすは래별.exe 99 PID 1800 wrote to memory of 3312 1800 аНаоすは래별.exe 99 PID 1800 wrote to memory of 3312 1800 аНаоすは래별.exe 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-03_1dadf47dc1b742b47f944612c15ae682_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-03_1dadf47dc1b742b47f944612c15ae682_icedid.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\ProgramData\аНаоすは래별.exe"C:\ProgramData\аНаоすは래별.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4696
-
-
-
C:\Users\Admin\AppData\Roaming\NuiGet\аНаоすは래별.exeC:\Users\Admin\AppData\Roaming\NuiGet\аНаоすは래별.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
562KB
MD51dadf47dc1b742b47f944612c15ae682
SHA1a75f16f949233d0e29283505a16202817270f499
SHA25660c8ad876547115a89694c6b5b191e9593c3ab222c3a70f247f03857c695e295
SHA5127e45405d848794cc7ce984cfdca900fc3fa76142bb9513a1bf2f31644889f107d9b6b2e5df00ce3428111d1d8479961e5b1757d1205624a90d57060c8709e924