Analysis
-
max time kernel
122s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2024 05:50
Behavioral task
behavioral1
Sample
2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe
Resource
win7-20240903-en
General
-
Target
2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe
-
Size
4.3MB
-
MD5
d247064077bfa7273fa8ea2d048b9b0e
-
SHA1
5fb73547e4229cea9b68340b3302609efc1c3c60
-
SHA256
bab5a0af3a8511d017a15702ac1fbc40e84e6e0885b70244f9b0ca10603f34f8
-
SHA512
a3f5eba9c9999e4807be82536761cd71dbb2237975a6b0524137f5567f9188253595542985532a5ae4157bd3a93d14e7bd3b86c82c914667b1c2ed5eb68651f7
-
SSDEEP
98304:dvfapmo1Y4+6Y7SOEfX/SbgR/3ziF3FNpOow:da9+6Y7SOEibgR/DiFVNTw
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral2/memory/4900-0-0x0000000000400000-0x0000000000613000-memory.dmp family_blackmoon behavioral2/files/0x000100000002156b-66.dat family_blackmoon -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe -
Xmrig family
-
XMRig Miner payload 17 IoCs
resource yara_rule behavioral2/memory/4900-0-0x0000000000400000-0x0000000000613000-memory.dmp xmrig behavioral2/files/0x000a000000023b9d-7.dat xmrig behavioral2/files/0x000100000002156b-66.dat xmrig behavioral2/memory/1452-281-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral2/memory/1452-389-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral2/memory/1452-390-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral2/memory/1452-392-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral2/memory/1452-394-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral2/memory/1452-396-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral2/memory/1452-398-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral2/memory/1452-405-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral2/memory/1452-417-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral2/memory/1452-418-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral2/memory/1452-427-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral2/memory/1452-428-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral2/memory/1452-429-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral2/memory/1452-467-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Taskmgr.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe" 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ZhuDongFangYu.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQPCTray.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQPCTray.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe" 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Taskmgr.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ZhuDongFangYu.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe" 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe" 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Tray.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Tray.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe" 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe" 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe -
Executes dropped EXE 1 IoCs
pid Process 1452 svchost.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe" 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\dcomcnfg.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\EaseOfAccessDialog.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\hh.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\SystemPropertiesRemote.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\xcopy.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\ByteCodeGenerator.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\verifiergui.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\whoami.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\IME\IMEJP\IMJPDCT.EXE 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\IME\IMETC\IMTCPROP.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\MRINFO.EXE 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\gpupdate.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\icsunattend.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\mfpmp.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\setup16.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\getmac.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\explorer.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\SearchFilterHost.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\srdelayed.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\tracerpt.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\WinRTNetMUAHostServer.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\wbem\mofcomp.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\ARP.EXE 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\certutil.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\fixmapi.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\instnm.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\nslookup.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\PresentationHost.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\setx.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\attrib.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\openfiles.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\unregmp2.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\wermgr.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\agentactivationruntimestarter.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\cmdl32.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\perfmon.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\SearchIndexer.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\secinit.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\shutdown.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\Taskmgr.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\wbem\WMIADAP.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\CloudNotifications.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\help.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\isoburn.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\ndadmin.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\taskkill.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\Fondue.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\chkntfs.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\esentutl.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\TsWpfWrp.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\WPDShextAutoplay.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\WSManHTTPConfig.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\xwizard.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\Com\comrepl.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\AtBroker.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\ftp.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\ipconfig.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\newdev.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\schtasks.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\TCPSVCS.EXE 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\TRACERT.EXE 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\winrs.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\bootcfg.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\SysWOW64\chkdsk.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Media Player\wmprph.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Program Files\Common Files\microsoft shared\ink\mip.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PDFREFLOW.EXE 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Program Files\Windows NT\Accessories\wordpad.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxCalendarAppImm.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\WinStore.App.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Program Files (x86)\Windows Mail\wabmig.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\policytool.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\servertool.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\msedge_pwa_launcher.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Program Files (x86)\Windows Mail\wab.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\VSTO\10.0\VSTOInstaller.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jps.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\MixedRealityPortal.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\ScreenSketch.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\XLICONS.EXE 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\joticon.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\notification_helper.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ssvagent.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\unpack200.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOUC.EXE 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files\Microsoft Office 15\ClientX64\OfficeClickToRun.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Program Files\Windows Media Player\wmlaunch.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\64BitMAPIBroker.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jaureg.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\notification_helper.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\serialver.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\misc.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Program Files\Windows Media Player\wmplayer.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Program Files\Windows Media Player\wmpnscfg.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Time.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SDXHelper.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\MSOHTMED.EXE 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\outicon.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\LogTransport2.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\reader_sl.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\MicrosoftEdgeUpdate.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Program Files\Internet Explorer\ExtExport.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstatd.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\schemagen.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\kinit.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-006E-0409-1000-0000000FF1CE}\misc.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeBackgroundHost.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\123.0.6312.123\chrome_installer.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOHTMED.EXE 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.DBConnection.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.ShowHelp.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\WinSxS\amd64_microsoft-windows-t..lishing-wmiprovider_31bf3856ad364e35_10.0.19041.1151_none_aa086da848b2c07b\f\rdpsign.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..policy-cmdlinetools_31bf3856ad364e35_10.0.19041.906_none_23e2379a6f03d0cb\f\gpupdate.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\amd64_microsoft-hyper-v-vstack-vmwp_31bf3856ad364e35_10.0.19041.264_none_13222f28beaa00a7\vmwp.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\amd64_netfx-jsc_b03f5f7f11d50a3a_10.0.19041.1_none_014838ef8bea39e9\jsc.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-c..periencehost-broker_31bf3856ad364e35_10.0.19041.746_none_1ce3c0f12fb5f8ec\CloudExperienceHostBroker.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-a..ence-infrastructure_31bf3856ad364e35_10.0.19041.928_none_b321f2c2ab7710a2\r\sdbinst.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-international-unattend_31bf3856ad364e35_10.0.19041.906_none_9e3e509d4c4881e1\MuiUnattend.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-setupapi_31bf3856ad364e35_10.0.19041.1_none_eae66734659b60d0\wowreg32.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sysprep_31bf3856ad364e35_10.0.19041.746_none_cd77eb91574a2623\f\sysprep.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\x86_netfx4-cvtres_exe_b03f5f7f11d50a3a_4.0.15805.0_none_9959f3c5e4eeac5f\cvtres.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p..alcontrols.appxmain_31bf3856ad364e35_10.0.19041.1266_none_1833f07ce0c90b68\WpcUapApp.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-x..rtificateenrollment_31bf3856ad364e35_10.0.19041.746_none_d19001beed7624dc\f\CertEnrollCtrl.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File opened for modification C:\Windows\WinSxS\amd64_windows-senseclient-service_31bf3856ad364e35_10.0.19041.1288_none_1cec63974464878f\SenseIR.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-fontview_31bf3856ad364e35_10.0.19041.1_none_04a9c5158a354e7a\fontview.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-tcpip-utility_31bf3856ad364e35_10.0.19041.1_none_f30cab80229c6b29\TCPSVCS.EXE 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-b..vironment-os-loader_31bf3856ad364e35_10.0.19041.1266_none_cfec8db821d83671\winload.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-convert_31bf3856ad364e35_10.0.19041.1266_none_119b1e415d838a28\r\autoconv.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-getmac_31bf3856ad364e35_10.0.19041.1_none_c1efa43e415898e4\getmac.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sethc_31bf3856ad364e35_10.0.19041.1_none_18b14c7d1478d4cc\sethc.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-sethc_31bf3856ad364e35_10.0.19041.746_none_4b0e3418084b5511\r\sethc.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-tieringengine_31bf3856ad364e35_10.0.19041.746_none_8d7110d8c33b651f\TieringEngineService.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-driverquery_31bf3856ad364e35_10.0.19041.1_none_5668834b68c7e852\driverquery.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\amd64_windows-application..egistrationverifier_31bf3856ad364e35_10.0.19041.746_none_64e9b1de23df7cf4\r\AppHostRegistrationVerifier.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-diskpart_31bf3856ad364e35_10.0.19041.964_none_510ebdd9292eed06\r\diskpart.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-netbt_31bf3856ad364e35_10.0.19041.746_none_48b2bd808a742e25\r\netbtugc.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\explorer.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-parentalcontrols-ots_31bf3856ad364e35_10.0.19041.84_none_8a067925a612632c\r\ApproveChildRequest.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-securestartup-cpl_31bf3856ad364e35_10.0.19041.1_none_0d7764d82a75e629\BitLockerWizardElev.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-thumbexthost_31bf3856ad364e35_10.0.19041.746_none_ce6643a69c39f80a\r\ThumbnailExtractionHost.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-winlogon_31bf3856ad364e35_10.0.19041.1266_none_e488d49c8a22d21e\r\winlogon.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..policy-cmdlinetools_31bf3856ad364e35_10.0.19041.1_none_f15a0c837b51c5fc\gpresult.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-wmi-core-svc_31bf3856ad364e35_10.0.19041.844_none_7eaa07ee55c22dcc\WinMgmt.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\amd64_microsoft-client-li..m-service-migration_31bf3856ad364e35_10.0.19041.84_none_8ea6a37043f4ae90\ClipUp.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-f..temcompareutilities_31bf3856ad364e35_10.0.19041.1_none_b6b7b206d4b9d895\comp.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-mspaint_31bf3856ad364e35_10.0.19041.746_none_6c16d1714d60fddf\mspaint.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-newdev_31bf3856ad364e35_10.0.19041.1202_none_8636783e05df6f4e\r\ndadmin.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-userinit_31bf3856ad364e35_10.0.19041.1_none_9219c799710d7e86\userinit.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-filtermanager-utils_31bf3856ad364e35_10.0.19041.546_none_01dba454b887ba53\r\fltMC.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\Ldr64.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-alg_31bf3856ad364e35_10.0.19041.746_none_86e29cecb9edce01\f\alg.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-manager_31bf3856ad364e35_10.0.19041.1202_none_7cdad2e52790705d\f\hvsirpcd.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-securestartup-cpl_31bf3856ad364e35_10.0.19041.1_none_0d7764d82a75e629\BitLockerWizard.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-b..re-memorydiagnostic_31bf3856ad364e35_10.0.19041.1202_none_574a25a5ee347454\memtest.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-rasclienttools_31bf3856ad364e35_10.0.19041.1_none_2f8c879e7c6f8b16\rasphone.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-u..onwakesettingflyout_31bf3856ad364e35_10.0.19041.746_none_949b3f6674b404fa\r\PasswordOnWakeSettingFlyout.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sqm-consolidator-base_31bf3856ad364e35_10.0.19041.1081_none_491d51c316b5ea8f\r\wsqmcons.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\Backup\amd64_microsoft-windows-appid_31bf3856ad364e35_10.0.19041.1202_none_cc0c3d35675da3a1_appidpolicyconverter.exe_83972af0 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-host-service_31bf3856ad364e35_10.0.19041.264_none_d58a0ca50a94510c\r\vmcompute.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\Backup\amd64_microsoft-windows-networkbridge_31bf3856ad364e35_10.0.19041.746_none_e5e33ba764e4ddec_bridgeunattend.exe_60b7e340 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-userinit_31bf3856ad364e35_10.0.19041.1_none_9c6e71eba56e4081\userinit.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\wow64_windowssearchengine_31bf3856ad364e35_7.0.19041.1151_none_f68db62a3702882b\r\SearchProtocolHost.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\amd64_microsoft-hyper-v-vstack-vmms_31bf3856ad364e35_10.0.19041.264_none_1477a882bdce0df2\f\vmms.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\amd64_netfx-vb_compiler_b03f5f7f11d50a3a_10.0.19041.1_none_b92a768e22c5262b\vbc.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\Microsoft.NET\Framework64\v3.0\Windows Communication Foundation\SMSvcHost.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\amd64_windows-senseclient-service_31bf3856ad364e35_10.0.19041.1288_none_1cec63974464878f\n\SenseSC.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-console-host-core_31bf3856ad364e35_10.0.19041.153_none_4b81b20e830f375b\f\conhost.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.84_none_81616275259e37fe\r\ImeBroker.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-rasclienttools_31bf3856ad364e35_10.0.19041.1_none_2537dd4c480ec91b\rasdial.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-t..lipboardredirection_31bf3856ad364e35_10.0.19041.746_none_dfcf5b6f69f16f7a\f\rdpclip.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-i..etexplorer-optional_31bf3856ad364e35_11.0.19041.1_none_8ced8f07ec5dee21\iexplore.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe File created C:\Windows\bfsvc.exe 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4900 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe Token: 33 4900 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe Token: SeIncBasePriorityPrivilege 4900 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe Token: SeIncBasePriorityPrivilege 1452 svchost.exe Token: SeLockMemoryPrivilege 1452 svchost.exe Token: SeLockMemoryPrivilege 1452 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4900 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4900 wrote to memory of 1452 4900 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe 86 PID 4900 wrote to memory of 1452 4900 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe 86 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-18_d247064077bfa7273fa8ea2d048b9b0e_icedid_xmrig.exe"1⤵
- UAC bypass
- Event Triggered Execution: Image File Execution Options Injection
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4900 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1452
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.4MB
MD5ecd3b26a6369f88fdaad96f77d166d8d
SHA119c7fbeade340e84a993b9e9cbf7b2b7f5c3b7e8
SHA256ec00844890fc3059d2b4c7cb6486189bbc5f129b8e0c9e5c2eea3dde7937b1d2
SHA5125a69f94cd4cfa5118442acdbb4c9366f4d984f7eb6742c5d9acdd090d6a7d43b1bab212a500dca3ecfb1d44c0dc0b89b1506bd7e2605f05bc82ba7a4ee8852b7
-
Filesize
1KB
MD588c5c5706d2e237422eda18490dc6a59
SHA1bb8d12375f6b995301e756de2ef4fa3a3f6efd39
SHA2564756a234ed3d61fe187d9b6140792e54e7b757545edff82df594a507e528ed8e
SHA512a417270a0d46de5bb06a621c0383c893042a506524713f89ba55567df6e5c3ac8b198bce5a0300ec6e716897bb53fd3e8289a51240157dc743004517673d4ab7
-
Filesize
833KB
MD54a87a4d6677558706db4afaeeeb58d20
SHA17738dc6a459f8415f0265d36c626b48202cd6764
SHA25608b55f9b7dafc53dfc43f7f70cdd7048d231767745b76dc4474370fb323d7ae7
SHA512bedd8ed4975df3fcd4a0f575d6f38e3841e7a4b771baac4f72033102a070818b8539eb101c50563d89d4f3454899a1cedb33047b02e421256dedf9aaf258b594
-
Filesize
81KB
MD5994ccf1b213aa060fbf3c67fb043829f
SHA1d385ef9fbbbbc7fd6c793cd4e8092b078dbf0e7d
SHA25610253a195c0e1016e7c871132d148f705e3f8e958872903ebf3719fed204d3cf
SHA51214989ec201c5a7890c1a0cdefc2542b1c3426406689ecb3f77453d9bd48ba7ebc812041452e6b1030be7df113b3cd903e07b77b2e78ff5c4bdee463cd0def576