Analysis
-
max time kernel
90s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 19:30
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe
-
Size
4.0MB
-
MD5
6086859dac39dcbff38f519cd0109068
-
SHA1
9e84a749fbc3ccd55acb8438d1b8e883078317ac
-
SHA256
29e0e1d909aaa3561b5a4d1eaa8b41d5d11a08d3003178ad9d48ef708888b03c
-
SHA512
c952c05a08a9f35537ea318ba4c9350f5134d2dc008b49ad85f4e95e64886e1a294fdd40a60fbedc62f19bdf62c565b0e1752bc1cd1a5ddda96181b8c0bd56a1
-
SSDEEP
49152:QoRg5xKs1GhzXDeWROc/f13mDzryu6+Cq99LyHHI+t6O8N+ailEy6dmpzeioK2ek:He5xKs1Gyr770oAaldmdmnp
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\windows\SysWOW64\drivers\spo0lve.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\windows\SysWOW64\drivers\spo0lve.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\spron = "C:\\Users\\Admin\\AppData\\Local\\Temp/2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe" 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pigdesk.bmp" 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre-1.8\bin\orbd.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ssvagent.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File created C:\Program Files\Windows Media Player\wmpconfig.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File created C:\Program Files\Windows Photo Viewer\ImagingDevices.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.DBConnection64.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\sscicons.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\pack200.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File created C:\Program Files\Windows Media Player\wmpshare.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jinfo.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate64.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File created C:\Program Files\Windows Mail\wabmig.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsimport.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\policytool.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File created C:\Program Files\Internet Explorer\ieinstal.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jjs.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\excelcnv.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\lyncicon.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\pj11icon.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\visicon.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\dotnet\dotnet.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ssvagent.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File created C:\Program Files\Windows Security\BrowserCore\BrowserCore.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\serialver.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\orbd.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmiregistry.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoadfsb.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File created C:\Program Files\Internet Explorer\iexplore.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jjs.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PerfBoost.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.DBConnection.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\osmadminicon.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaw.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\klist.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoia.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File created C:\Program Files\Internet Explorer\ExtExport.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmid.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\fontconfig.properties.src 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java-rmi.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\pptico.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File created C:\Program Files\Windows Media Player\wmplayer.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\orbd.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\kinit.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ktab.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoasb.exe 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe -
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\Desktop\WallpaperStyle = "2" 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\Desktop\TileWallpaper = "2" 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe 1852 2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-05_6086859dac39dcbff38f519cd0109068_hijackloader_icedid.exe"1⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.1MB
MD5ae914491a07be4b567092ec75b67b43d
SHA1638a50df3ddf3611a4720ca3793987d5a89e5963
SHA256c9b1165bb0a6966009dfbfb6a9e1e55b5be79397bcec48b71ad4c387d5080a33
SHA512594238d45e53f01ca8742aeeb35ba236fbfa108ec6b9eae0c30d3182dc2a91ad7e11768e2f957a6f8487c4dbe705c5f56b022eb2e9d0b8da01cd36050343c6a6