Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
14-11-2024 09:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe
-
Size
4.1MB
-
MD5
efda6833e548d16d052145b87da555c3
-
SHA1
a162d4a7d7f1d00715b1a733ae729fbd689e2e47
-
SHA256
396ebd2834ae19e463ca9faefc1f36b95b47afcce9005e6922e937546071b75e
-
SHA512
bc2499e24a5c697e875246bd2f0284cfd54b3b6b24bf50acaa8864fa57e127cd464da7ff158cbbc936167880ef67e3c8973f2b384714e9c8f5f2213411149ba9
-
SSDEEP
49152:Q4Rg5x6c1noU/aLoU/j+Cq99LyHHI+t6O8N+ailEy6dmpzeioK2enVzG1nkypq:Xe5x6c1noLoh0oAaldmdmnp
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
Processes:
2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exedescription ioc Process File created C:\windows\SysWOW64\drivers\spo0lve.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\windows\SysWOW64\drivers\spo0lve.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\spron = "C:\\Users\\Admin\\AppData\\Local\\Temp/2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe" 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe -
Drops file in Program Files directory 64 IoCs
Processes:
2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exedescription ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\MineSweeper.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File created C:\Program Files\Windows Mail\wabmig.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jhat.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\xjc.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\policytool.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jre7\bin\rmid.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\Peacock.htm 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jinfo.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File created C:\Program Files\Windows Media Player\wmpenc.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File created C:\Program Files\Windows Media Player\wmprph.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\mip.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmap.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jre7\bin\javacpl.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\kinit.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jre7\bin\servertool.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\InputPersonalization.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\Shades of Blue.htm 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File created C:\Program Files\DVD Maker\DVDMaker.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File created C:\Program Files\Internet Explorer\iediagcmd.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File created C:\Program Files\Windows Defender\MpCmdRun.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File created C:\Program Files\Windows NT\Accessories\wordpad.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\orbd.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\title.htm 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\olh001.htm 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jre7\bin\javaws.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\InkWatson.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jre7\lib\fontconfig.properties.src 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\7-Zip\7z.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsimport.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jre7\bin\ktab.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File created C:\Program Files\Windows Journal\Journal.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File created C:\Program Files\Windows Mail\WinMail.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\Garden.htm 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File created C:\Program Files\Internet Explorer\ieinstal.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File created C:\Program Files\Internet Explorer\iexplore.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jsadebugd.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\chkrzm.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File created C:\Program Files\Windows Media Player\wmpnetwk.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File created C:\Program Files\Windows Mail\wab.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\html\cpyr.htm 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jre7\bin\pack200.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jre7\bin\policytool.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jre7\bin\tnameserv.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exepid Process 2536 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 2536 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 2536 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 2536 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 2536 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 2536 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 2536 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 2536 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 2536 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 2536 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 2536 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 2536 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 2536 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 2536 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 2536 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 2536 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 2536 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 2536 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 2536 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 2536 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 2536 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 2536 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 2536 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 2536 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 2536 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exepid Process 2536 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 2536 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe"1⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.1MB
MD5c99eb0d0dae059523301e2e6125943d0
SHA11d9c77484542bd46e9b50334e64e35b803374e9d
SHA2561ea3b67e36e3c68c791c8645ba535472c7e4bc0de78bc23edd6efe218c0cb4e9
SHA512668a2938552407e62c3329a983dfd23fcd1ed0a3ae84d29265178ed74ae58f888e892d51e03d1c944f91914b2fd889c0ffabd5c230711d4a338e76cc01d9bd69