Analysis
-
max time kernel
92s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24/02/2025, 16:39
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-24_598d72228297315d439da009ca231d80_icedid.exe
Resource
win7-20241010-en
General
-
Target
2025-02-24_598d72228297315d439da009ca231d80_icedid.exe
-
Size
492KB
-
MD5
598d72228297315d439da009ca231d80
-
SHA1
2a9109574bc13006596ea13a143825db57e86fa5
-
SHA256
cbdaf38c5912ef4b839e4baa5b01695828347ed9aab632a8d5fcb5e97f338990
-
SHA512
43082e0106da469a10e68d25e1f55e4a1d8491b95cd02e974c3625afb0de2486f74283f038b70131eae154d13e0717cb830d6ba1328818ce3e950ff64a404d17
-
SSDEEP
6144:BY352aQ3hklPFghZqqdd2PRMmUnpDUmwqO27fXjscN9Q9h8w2gyx7Ddp2q44:BG52rkDg/TdE+DUGXgEQI2yx+q
Malware Config
Signatures
-
Trickbot family
-
Trickbot x86 loader 5 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral1/memory/932-14-0x0000000000370000-0x00000000003A1000-memory.dmp trickbot_loader32 behavioral1/memory/932-13-0x0000000000340000-0x000000000036F000-memory.dmp trickbot_loader32 behavioral1/memory/932-11-0x0000000000370000-0x00000000003A1000-memory.dmp trickbot_loader32 behavioral1/memory/1276-26-0x0000000000300000-0x0000000000331000-memory.dmp trickbot_loader32 behavioral1/memory/932-30-0x0000000000370000-0x00000000003A1000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 932 IƆCCMX ↀↂ;;;;рора;;;;;;ж;;;;;;;;;;;яЫФЦйвЫФв005645C.exe 1276 IƆCCMX ↀↂ;;;;рора;;;;;;ж;;;;;;;;;;;яЫФЦйвЫФв005645C.exe 2968 IƆCCMX ↀↂ;;;;рора;;;;;;ж;;;;;;;;;;;яЫФЦйвЫФв005645C.exe -
Loads dropped DLL 4 IoCs
pid Process 2236 2025-02-24_598d72228297315d439da009ca231d80_icedid.exe 2236 2025-02-24_598d72228297315d439da009ca231d80_icedid.exe 932 IƆCCMX ↀↂ;;;;рора;;;;;;ж;;;;;;;;;;;яЫФЦйвЫФв005645C.exe 932 IƆCCMX ↀↂ;;;;рора;;;;;;ж;;;;;;;;;;;яЫФЦйвЫФв005645C.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-24_598d72228297315d439da009ca231d80_icedid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IƆCCMX ↀↂ;;;;рора;;;;;;ж;;;;;;;;;;;яЫФЦйвЫФв005645C.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IƆCCMX ↀↂ;;;;рора;;;;;;ж;;;;;;;;;;;яЫФЦйвЫФв005645C.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IƆCCMX ↀↂ;;;;рора;;;;;;ж;;;;;;;;;;;яЫФЦйвЫФв005645C.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 2968 IƆCCMX ↀↂ;;;;рора;;;;;;ж;;;;;;;;;;;яЫФЦйвЫФв005645C.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2236 2025-02-24_598d72228297315d439da009ca231d80_icedid.exe 932 IƆCCMX ↀↂ;;;;рора;;;;;;ж;;;;;;;;;;;яЫФЦйвЫФв005645C.exe 1276 IƆCCMX ↀↂ;;;;рора;;;;;;ж;;;;;;;;;;;яЫФЦйвЫФв005645C.exe 2968 IƆCCMX ↀↂ;;;;рора;;;;;;ж;;;;;;;;;;;яЫФЦйвЫФв005645C.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2236 wrote to memory of 932 2236 2025-02-24_598d72228297315d439da009ca231d80_icedid.exe 29 PID 2236 wrote to memory of 932 2236 2025-02-24_598d72228297315d439da009ca231d80_icedid.exe 29 PID 2236 wrote to memory of 932 2236 2025-02-24_598d72228297315d439da009ca231d80_icedid.exe 29 PID 2236 wrote to memory of 932 2236 2025-02-24_598d72228297315d439da009ca231d80_icedid.exe 29 PID 932 wrote to memory of 1276 932 IƆCCMX ↀↂ;;;;рора;;;;;;ж;;;;;;;;;;;яЫФЦйвЫФв005645C.exe 30 PID 932 wrote to memory of 1276 932 IƆCCMX ↀↂ;;;;рора;;;;;;ж;;;;;;;;;;;яЫФЦйвЫФв005645C.exe 30 PID 932 wrote to memory of 1276 932 IƆCCMX ↀↂ;;;;рора;;;;;;ж;;;;;;;;;;;яЫФЦйвЫФв005645C.exe 30 PID 932 wrote to memory of 1276 932 IƆCCMX ↀↂ;;;;рора;;;;;;ж;;;;;;;;;;;яЫФЦйвЫФв005645C.exe 30 PID 1276 wrote to memory of 2100 1276 IƆCCMX ↀↂ;;;;рора;;;;;;ж;;;;;;;;;;;яЫФЦйвЫФв005645C.exe 31 PID 1276 wrote to memory of 2100 1276 IƆCCMX ↀↂ;;;;рора;;;;;;ж;;;;;;;;;;;яЫФЦйвЫФв005645C.exe 31 PID 1276 wrote to memory of 2100 1276 IƆCCMX ↀↂ;;;;рора;;;;;;ж;;;;;;;;;;;яЫФЦйвЫФв005645C.exe 31 PID 1276 wrote to memory of 2100 1276 IƆCCMX ↀↂ;;;;рора;;;;;;ж;;;;;;;;;;;яЫФЦйвЫФв005645C.exe 31 PID 1276 wrote to memory of 2100 1276 IƆCCMX ↀↂ;;;;рора;;;;;;ж;;;;;;;;;;;яЫФЦйвЫФв005645C.exe 31 PID 1276 wrote to memory of 2100 1276 IƆCCMX ↀↂ;;;;рора;;;;;;ж;;;;;;;;;;;яЫФЦйвЫФв005645C.exe 31 PID 2928 wrote to memory of 2968 2928 taskeng.exe 33 PID 2928 wrote to memory of 2968 2928 taskeng.exe 33 PID 2928 wrote to memory of 2968 2928 taskeng.exe 33 PID 2928 wrote to memory of 2968 2928 taskeng.exe 33 PID 2968 wrote to memory of 1800 2968 IƆCCMX ↀↂ;;;;рора;;;;;;ж;;;;;;;;;;;яЫФЦйвЫФв005645C.exe 34 PID 2968 wrote to memory of 1800 2968 IƆCCMX ↀↂ;;;;рора;;;;;;ж;;;;;;;;;;;яЫФЦйвЫФв005645C.exe 34 PID 2968 wrote to memory of 1800 2968 IƆCCMX ↀↂ;;;;рора;;;;;;ж;;;;;;;;;;;яЫФЦйвЫФв005645C.exe 34 PID 2968 wrote to memory of 1800 2968 IƆCCMX ↀↂ;;;;рора;;;;;;ж;;;;;;;;;;;яЫФЦйвЫФв005645C.exe 34 PID 2968 wrote to memory of 1800 2968 IƆCCMX ↀↂ;;;;рора;;;;;;ж;;;;;;;;;;;яЫФЦйвЫФв005645C.exe 34 PID 2968 wrote to memory of 1800 2968 IƆCCMX ↀↂ;;;;рора;;;;;;ж;;;;;;;;;;;яЫФЦйвЫФв005645C.exe 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-02-24_598d72228297315d439da009ca231d80_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-24_598d72228297315d439da009ca231d80_icedid.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\ProgramData\IƆCCMX ↀↂ;;;;рора;;;;;;ж;;;;;;;;;;;яЫФЦйвЫФв005645C.exe"C:\ProgramData\IƆCCMX ↀↂ;;;;рора;;;;;;ж;;;;;;;;;;;яЫФЦйвЫФв005645C.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Users\Admin\AppData\Roaming\WinDirectTools\IƆCCMX ↀↂ;;;;рора;;;;;;ж;;;;;;;;;;;яЫФЦйвЫФв005645C.exe"C:\Users\Admin\AppData\Roaming\WinDirectTools\IƆCCMX ↀↂ;;;;рора;;;;;;ж;;;;;;;;;;;яЫФЦйвЫФв005645C.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe4⤵PID:2100
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {ABDEEACB-41BD-448B-A0EC-656D416B22A9} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Roaming\WinDirectTools\IƆCCMX ↀↂ;;;;рора;;;;;;ж;;;;;;;;;;;яЫФЦйвЫФв005645C.exe"C:\Users\Admin\AppData\Roaming\WinDirectTools\IƆCCMX ↀↂ;;;;рора;;;;;;ж;;;;;;;;;;;яЫФЦйвЫФв005645C.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1800
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
492KB
MD5598d72228297315d439da009ca231d80
SHA12a9109574bc13006596ea13a143825db57e86fa5
SHA256cbdaf38c5912ef4b839e4baa5b01695828347ed9aab632a8d5fcb5e97f338990
SHA51243082e0106da469a10e68d25e1f55e4a1d8491b95cd02e974c3625afb0de2486f74283f038b70131eae154d13e0717cb830d6ba1328818ce3e950ff64a404d17