Analysis
-
max time kernel
93s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2024 09:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe
-
Size
4.1MB
-
MD5
efda6833e548d16d052145b87da555c3
-
SHA1
a162d4a7d7f1d00715b1a733ae729fbd689e2e47
-
SHA256
396ebd2834ae19e463ca9faefc1f36b95b47afcce9005e6922e937546071b75e
-
SHA512
bc2499e24a5c697e875246bd2f0284cfd54b3b6b24bf50acaa8864fa57e127cd464da7ff158cbbc936167880ef67e3c8973f2b384714e9c8f5f2213411149ba9
-
SSDEEP
49152:Q4Rg5x6c1noU/aLoU/j+Cq99LyHHI+t6O8N+ailEy6dmpzeioK2enVzG1nkypq:Xe5x6c1noLoh0oAaldmdmnp
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
Processes:
2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exedescription ioc Process File created C:\windows\SysWOW64\drivers\spo0lve.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\windows\SysWOW64\drivers\spo0lve.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\spron = "C:\\Users\\Admin\\AppData\\Local\\Temp/2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe" 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pigdesk.bmp" 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe -
Drops file in Program Files directory 64 IoCs
Processes:
2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exedescription ioc Process File opened for modification C:\Program Files\Java\jre-1.8\bin\rmid.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\xlicons.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File created C:\Program Files\Internet Explorer\ieinstal.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate32.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SDXHelperBgt.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaws.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\policytool.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\EQUATION\eqnedt32.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\osmclienticon.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoev.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVLP.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstat.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\servertool.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File created C:\Program Files\Windows Media Player\setup_wm.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdb.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\AppSharingHookController.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\lyncicon.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmiregistry.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java-rmi.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\servertool.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File created C:\Program Files\Windows Media Player\wmpshare.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoadfsb.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\servertool.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jabswitch.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msotd.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jsadebugd.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File created C:\Program Files\Internet Explorer\iexplore.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\keytool.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\sscicons.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\7-Zip\7z.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\klist.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File created C:\Program Files\Internet Explorer\ielowutil.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\outicon.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\unpack200.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\dbcicons.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstatd.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\OLicenseHeartbeat.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaws.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\keytool.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\pack200.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\dotnet\dotnet.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\pack200.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jp2launcher.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe File opened for modification C:\Program Files\Microsoft Office 15\ClientX64\IntegratedOffice.exe 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe -
Modifies Control Panel 2 IoCs
Processes:
2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\Desktop\WallpaperStyle = "2" 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\Desktop\TileWallpaper = "2" 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
Processes:
2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exepid Process 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exepid Process 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe 4772 2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-14_efda6833e548d16d052145b87da555c3_hijackloader_icedid.exe"1⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.1MB
MD5c99eb0d0dae059523301e2e6125943d0
SHA11d9c77484542bd46e9b50334e64e35b803374e9d
SHA2561ea3b67e36e3c68c791c8645ba535472c7e4bc0de78bc23edd6efe218c0cb4e9
SHA512668a2938552407e62c3329a983dfd23fcd1ed0a3ae84d29265178ed74ae58f888e892d51e03d1c944f91914b2fd889c0ffabd5c230711d4a338e76cc01d9bd69