Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/03/2025, 03:49
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-07_2755313b6cf970afacb7daad4402713f_icedid_ramnit.exe
Resource
win7-20240903-en
General
-
Target
2025-03-07_2755313b6cf970afacb7daad4402713f_icedid_ramnit.exe
-
Size
435KB
-
MD5
2755313b6cf970afacb7daad4402713f
-
SHA1
2d3ede84d180c3543f1433781066da2985cae310
-
SHA256
1a649271eeb4470353195f49e6726aafddddc9a7d2c37e4a408b72909abda373
-
SHA512
65ce4700b900b190ffd543b1df3b0b789056241618d44ddcc44520a1429051bd20a6de9818d0504d58e7468205f0dc5657cc3d5e35bfe75bc0d02f5b16e304f9
-
SSDEEP
12288:TRX3wK9rybO3AlLBeTWi+eO6e2GAnG+pG/Yk:TRX3wK9ruO3Alpi+eO6e25NgYk
Malware Config
Extracted
emotet
Epoch1
219.92.13.25:80
91.236.4.234:443
192.241.143.52:8080
186.3.232.68:80
192.241.146.84:8080
12.162.84.2:8080
50.28.51.143:8080
221.133.46.86:443
185.94.252.27:443
114.109.179.60:80
186.33.141.88:80
172.104.169.32:8080
184.57.130.8:80
177.139.131.143:443
77.55.211.77:8080
81.169.202.3:443
72.47.248.48:7080
212.71.237.140:8080
190.229.148.144:80
178.79.163.131:8080
118.69.71.14:80
170.81.48.2:80
61.92.159.208:8080
113.190.254.245:80
111.67.12.221:8080
177.72.13.80:80
80.249.176.206:80
2.47.112.152:80
83.169.21.32:7080
149.62.173.247:8080
190.181.235.46:80
201.213.32.59:80
190.17.195.202:80
190.147.137.153:443
5.196.35.138:7080
68.183.190.199:8080
46.214.11.172:80
175.114.178.83:443
104.131.41.185:8080
177.66.190.130:80
203.25.159.3:8080
190.6.193.152:8080
70.32.84.74:8080
45.161.242.102:80
204.225.249.100:7080
70.32.115.157:8080
185.94.252.12:80
77.90.136.129:8080
207.255.37.143:80
91.83.93.124:7080
82.196.15.205:8080
104.131.103.37:8080
94.176.234.118:443
187.51.47.26:80
187.162.248.237:80
202.62.39.111:80
190.163.1.31:8080
143.0.87.101:80
104.236.161.64:8080
185.94.252.13:443
46.28.111.142:7080
181.31.211.181:80
Signatures
-
Emotet family
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 2552 2025-03-07_2755313b6cf970afacb7daad4402713f_icedid_ramnitmgr.exe 2680 QCLIPROVmgr.exe -
Loads dropped DLL 4 IoCs
pid Process 2960 2025-03-07_2755313b6cf970afacb7daad4402713f_icedid_ramnit.exe 2960 2025-03-07_2755313b6cf970afacb7daad4402713f_icedid_ramnit.exe 2668 QCLIPROV.exe 2668 QCLIPROV.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\QCLIPROV\QCLIPROVmgr.exe QCLIPROV.exe -
resource yara_rule behavioral1/files/0x0007000000012118-3.dat upx behavioral1/memory/2552-10-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2552-12-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2552-19-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2680-37-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2680-38-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2552-43-0x0000000000400000-0x000000000045D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QCLIPROV.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QCLIPROVmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-07_2755313b6cf970afacb7daad4402713f_icedid_ramnit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-07_2755313b6cf970afacb7daad4402713f_icedid_ramnitmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{317838C1-FB07-11EF-8C6C-D686196AC2C0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff5600000000000000dc04000065020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "447481246" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{316FF391-FB07-11EF-8C6C-D686196AC2C0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2552 2025-03-07_2755313b6cf970afacb7daad4402713f_icedid_ramnitmgr.exe 2552 2025-03-07_2755313b6cf970afacb7daad4402713f_icedid_ramnitmgr.exe 2552 2025-03-07_2755313b6cf970afacb7daad4402713f_icedid_ramnitmgr.exe 2552 2025-03-07_2755313b6cf970afacb7daad4402713f_icedid_ramnitmgr.exe 2552 2025-03-07_2755313b6cf970afacb7daad4402713f_icedid_ramnitmgr.exe 2552 2025-03-07_2755313b6cf970afacb7daad4402713f_icedid_ramnitmgr.exe 2552 2025-03-07_2755313b6cf970afacb7daad4402713f_icedid_ramnitmgr.exe 2552 2025-03-07_2755313b6cf970afacb7daad4402713f_icedid_ramnitmgr.exe 2680 QCLIPROVmgr.exe 2680 QCLIPROVmgr.exe 2680 QCLIPROVmgr.exe 2680 QCLIPROVmgr.exe 2680 QCLIPROVmgr.exe 2680 QCLIPROVmgr.exe 2680 QCLIPROVmgr.exe 2680 QCLIPROVmgr.exe 2668 QCLIPROV.exe 2668 QCLIPROV.exe 2668 QCLIPROV.exe 2668 QCLIPROV.exe 2668 QCLIPROV.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2960 2025-03-07_2755313b6cf970afacb7daad4402713f_icedid_ramnit.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2552 2025-03-07_2755313b6cf970afacb7daad4402713f_icedid_ramnitmgr.exe Token: SeDebugPrivilege 2680 QCLIPROVmgr.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2332 iexplore.exe 2516 iexplore.exe 2332 iexplore.exe 2332 iexplore.exe -
Suspicious use of SetWindowsHookEx 22 IoCs
pid Process 2960 2025-03-07_2755313b6cf970afacb7daad4402713f_icedid_ramnit.exe 2960 2025-03-07_2755313b6cf970afacb7daad4402713f_icedid_ramnit.exe 2332 iexplore.exe 2332 iexplore.exe 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE 2516 iexplore.exe 2516 iexplore.exe 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2668 QCLIPROV.exe 2668 QCLIPROV.exe 2332 iexplore.exe 2332 iexplore.exe 2332 iexplore.exe 2332 iexplore.exe 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2552 2960 2025-03-07_2755313b6cf970afacb7daad4402713f_icedid_ramnit.exe 30 PID 2960 wrote to memory of 2552 2960 2025-03-07_2755313b6cf970afacb7daad4402713f_icedid_ramnit.exe 30 PID 2960 wrote to memory of 2552 2960 2025-03-07_2755313b6cf970afacb7daad4402713f_icedid_ramnit.exe 30 PID 2960 wrote to memory of 2552 2960 2025-03-07_2755313b6cf970afacb7daad4402713f_icedid_ramnit.exe 30 PID 2552 wrote to memory of 2332 2552 2025-03-07_2755313b6cf970afacb7daad4402713f_icedid_ramnitmgr.exe 31 PID 2552 wrote to memory of 2332 2552 2025-03-07_2755313b6cf970afacb7daad4402713f_icedid_ramnitmgr.exe 31 PID 2552 wrote to memory of 2332 2552 2025-03-07_2755313b6cf970afacb7daad4402713f_icedid_ramnitmgr.exe 31 PID 2552 wrote to memory of 2332 2552 2025-03-07_2755313b6cf970afacb7daad4402713f_icedid_ramnitmgr.exe 31 PID 2552 wrote to memory of 2516 2552 2025-03-07_2755313b6cf970afacb7daad4402713f_icedid_ramnitmgr.exe 32 PID 2552 wrote to memory of 2516 2552 2025-03-07_2755313b6cf970afacb7daad4402713f_icedid_ramnitmgr.exe 32 PID 2552 wrote to memory of 2516 2552 2025-03-07_2755313b6cf970afacb7daad4402713f_icedid_ramnitmgr.exe 32 PID 2552 wrote to memory of 2516 2552 2025-03-07_2755313b6cf970afacb7daad4402713f_icedid_ramnitmgr.exe 32 PID 2332 wrote to memory of 1028 2332 iexplore.exe 33 PID 2332 wrote to memory of 1028 2332 iexplore.exe 33 PID 2332 wrote to memory of 1028 2332 iexplore.exe 33 PID 2332 wrote to memory of 1028 2332 iexplore.exe 33 PID 2516 wrote to memory of 2816 2516 iexplore.exe 34 PID 2516 wrote to memory of 2816 2516 iexplore.exe 34 PID 2516 wrote to memory of 2816 2516 iexplore.exe 34 PID 2516 wrote to memory of 2816 2516 iexplore.exe 34 PID 2960 wrote to memory of 2668 2960 2025-03-07_2755313b6cf970afacb7daad4402713f_icedid_ramnit.exe 35 PID 2960 wrote to memory of 2668 2960 2025-03-07_2755313b6cf970afacb7daad4402713f_icedid_ramnit.exe 35 PID 2960 wrote to memory of 2668 2960 2025-03-07_2755313b6cf970afacb7daad4402713f_icedid_ramnit.exe 35 PID 2960 wrote to memory of 2668 2960 2025-03-07_2755313b6cf970afacb7daad4402713f_icedid_ramnit.exe 35 PID 2668 wrote to memory of 2680 2668 QCLIPROV.exe 36 PID 2668 wrote to memory of 2680 2668 QCLIPROV.exe 36 PID 2668 wrote to memory of 2680 2668 QCLIPROV.exe 36 PID 2668 wrote to memory of 2680 2668 QCLIPROV.exe 36 PID 2680 wrote to memory of 660 2680 QCLIPROVmgr.exe 37 PID 2680 wrote to memory of 660 2680 QCLIPROVmgr.exe 37 PID 2680 wrote to memory of 660 2680 QCLIPROVmgr.exe 37 PID 2680 wrote to memory of 660 2680 QCLIPROVmgr.exe 37 PID 2680 wrote to memory of 3060 2680 QCLIPROVmgr.exe 38 PID 2680 wrote to memory of 3060 2680 QCLIPROVmgr.exe 38 PID 2680 wrote to memory of 3060 2680 QCLIPROVmgr.exe 38 PID 2680 wrote to memory of 3060 2680 QCLIPROVmgr.exe 38 PID 2332 wrote to memory of 1704 2332 iexplore.exe 39 PID 2332 wrote to memory of 1704 2332 iexplore.exe 39 PID 2332 wrote to memory of 1704 2332 iexplore.exe 39 PID 2332 wrote to memory of 1704 2332 iexplore.exe 39 PID 2332 wrote to memory of 2144 2332 iexplore.exe 40 PID 2332 wrote to memory of 2144 2332 iexplore.exe 40 PID 2332 wrote to memory of 2144 2332 iexplore.exe 40 PID 2332 wrote to memory of 2144 2332 iexplore.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-07_2755313b6cf970afacb7daad4402713f_icedid_ramnit.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-07_2755313b6cf970afacb7daad4402713f_icedid_ramnit.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\2025-03-07_2755313b6cf970afacb7daad4402713f_icedid_ramnitmgr.exeC:\Users\Admin\AppData\Local\Temp\2025-03-07_2755313b6cf970afacb7daad4402713f_icedid_ramnitmgr.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2332 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1028
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2332 CREDAT:472071 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1704
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2332 CREDAT:668675 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2144
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2516 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2816
-
-
-
-
C:\Windows\SysWOW64\QCLIPROV\QCLIPROV.exe"C:\Windows\SysWOW64\QCLIPROV\QCLIPROV.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\QCLIPROV\QCLIPROVmgr.exeC:\Windows\SysWOW64\QCLIPROV\QCLIPROVmgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:660
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:3060
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a62b74767c6811784e82843122dc4ddc
SHA111ee4dd9a0d517d0a90e4e173c04cb99e9bde113
SHA2564c78bad8f7224ee94e13ec0cff4c7e07c75b8c0a974876e59e05883fdd02c6ec
SHA512ffc05b87615ac72bfa41f4ea988ce20caa2745d52108c754a3d1d5d758a084510b372cba5112aa392597750eb507de96597a0eed92c01f5e803a6397c6efa29c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599d205053395f2df9b42e76bc1956de7
SHA1eafe2dd3ed7ac0ce1024b96ede56b1fc60e80436
SHA2568ee0979afbf00d851b5f86245dae11218e0690a6b7b3a7b8c2fa239446515346
SHA512f82e9ecd8f31d8b0fef1e0e436af5e72e8c7b1629f0afbbc75dce9533b0cf8f46f1dcdd4624bf274cfe6db334a62c8e963724d475538bdd75815b4a38c8142e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59621f955e99ae05a0a621b4e1194881a
SHA197d6803c7e62a8b08742c4bc018b59af01d09162
SHA2560b7aeb757282b85e776c5c08f0786ea7c1b00907125a7ec83f3555350a200f3e
SHA5125a875f9d4d05b17e9d7452fa051a565e1023891973de390483d91a0f279ad05262dcd455a08d9149d12493a523deef0faf3911f36a67086d9ec39c27d699c923
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b234e8e40f6a2f4e2a5f0551a5d917eb
SHA1148df974ad0b82cba71e0f42afdc329cf697927b
SHA256b9982078c7293625d03f1a2fc9006f722a57057ae81104d88b157a341dc38ea9
SHA5122a07d4fe2f075a79488c4ead1ac8c704f7c4db9a0d568b18cb81e87dd2d97bd8fb0877fac8cf05e5aff9cf4f726932223788d0e72b7231cea13090b3aaa35c90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540f737803d3ef505a9028e2c91233bfd
SHA1848cebff8df81445201aedaa370dcf0e0d71c6e0
SHA256a656a44b9b507885673558fceb7abef4309c05a469e15710421d553a0c4b1ab5
SHA51241a2d69ebef58df71a8b46698edbf54a6b4d9fd9c2a4d92e1c27484102307c905a0e4c18c1e7a3b44d059d224da13407c136963ca60d1e05c43601d221c7d6e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bb2fceb6869a93e462790e3c23d943a
SHA15a42f7d7acf65ea72db598e944b3eb362ce00873
SHA256d17b735637dd8b585fa3cc42aa264f3d2f517df0b29f6369d154614130691f38
SHA51271adc1a4bbe0c45a7848854748d499d80f6173785c299a9efa83fee9b1b6482cc0b0db0e58460a78369e46f9bc62a108c5404e9311c6e46bb00f79aa364ce2e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51da0a31eda5000763b126852d644091c
SHA11d9817784277d2ccb28a3b93fb65afeae4a93366
SHA256eee795bfb46b2c0e15b67c5115e2e1363cde70e84149248a30138e15ed7844fc
SHA5120a16f7bce456bddc6d272da2e14801ef1d6f0281cedeb0fa9d8e88bfa20f9d40f3ba7d9ee92626bbd49397c5a4f63033dc4f511165d907bcb769392c36f66006
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbb6838b37f621badd3752d00af477b2
SHA1426e652b680d1f35401a7e941b675313f02f2050
SHA2560e578437952c6262527bf0ca1ead18d3e1a151a618307c8ecd01ae651abf7270
SHA512312c1b5994e90925690014aab32bf5a689c85c4fbb0499ccbb59e7875ab4b51f8579aa0eba9a24eba34d90a9a352c04b0c3a7c8e6a30cec2b01c1b665c6ff112
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52858d2a775a77f3bf6c0361a94ee6947
SHA129423e2c035cadf9a18e8bb1e0f80d151624fabf
SHA25661e48c6d48f3f23b08a3a1aa7dfe4eba9f66c06caaf975c0c6e7f7978524daf0
SHA512349ffad95bd5e4352cc8f96f61a3cddd38cf1f2be6eae9d202133e3e3d69e40d6737149f0ed82b7ce9cf765040d1441c938b2a24f957703e0bc3b12f516fdbd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc1234a12ae8fe292c3e0417d572b807
SHA145c2c615392db0fca02a4dd0af89bf5230ccff68
SHA2562e51952e8fb81efe2a25aad1396bfc747304596279a1fb07051f6481d39ce100
SHA512dde949053b63ad7d898c78935ae6790418286b4395eac9e089fd0de0473e81753d256b462813ba0e09ca3e3961874fe864731c950a4dc5938db9a62145ff55a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fcbc5dd923b1ea00ca9cd243d2d3dd5c
SHA1ffc5eea89de6c1b5c34801c86d864d15c07cefe2
SHA25628770a47f690f3fd1aae12c0c24d6a75385e3bc4bbb1fe37a3ceeb116ded87ba
SHA5126ad7963516bb60aa27d691e051cbd056483af8c1991538be6b2637e985704c5859410f0412fbb22d83b1dd099dfb771cb8649d2c30668b4b48677be53fe268cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c125d4519aac73dfe7e48535a6ae3ea
SHA1931cca94fc8b4f69559fe3c97fb79dd010759bce
SHA256ccf93d45f7b2a4987df06240e17ccd2d771415851136e8edcf2783e0f58c093d
SHA512921ebf9dc3066f5dda72771b23e9366e54d9e161769da497d31a0f5e031e25895a0bdd33d068e8e90a9d00150e990cd1e83a827a59b982bbb871b1deb02304e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a21b36d7ee72854f4465559dda4f77f7
SHA1a63f247c5b2147aa64fdafaf4cc6d9ab2b1afa63
SHA256b5a97d5d923c6128685f625ad71da847df1d66194ed7e2f4660dd0bd3400cade
SHA5123542601efcee75806c0408038f0f30b29f2bb4da095055fff6aadcfd8b876805d6bd0f61c59d8f7856513299b23e3085ab6065a67b83c386e2807fc26bdb4734
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d27504c568b52cb87d542b0308afaf0a
SHA1ceb4fb3cdaa3553739f75ceefcdb5e21dcae8740
SHA256b856b117fce6d336dd0640ef596b32add0fecc0cbc6134dd3cc8d6cdf62d14a6
SHA5126191d355e32af9278c6bf43c99e908c6ca94a0769439b53c9844c44721002e5adf6878aef79ce2df271b1af077bb40b6172b8a186bae6710bed95d897035e2fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1f07208aa42440d5f94e7631996e18a
SHA13356ce0118fbfb71044a73ca2971b6d14708e033
SHA256589b668c9468821f05c7d87974bdcd593f3733447cbee97f0e952919c517244b
SHA5123ed85c937c2d452d42d810a6bd178054c168b9ad695186bcaa0863df84cf3630d7bb7de3fdd6639498e5bee7653815ce47b60538ef7f1b1a6abfa072ce8942a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c0cfe02864ce3f745d761658b057165
SHA16a17810f74e5da4b5b55d5e21613c71a544c8da0
SHA25679985dd65dbf70067dca8a0040e366a1b05c388c0b9770a07bafbce36cb9e22d
SHA512384ac4a6edd5e8f5b5d4497af2d3eb6fd7f17a5de337409c3604b6165ea106450c68aa6ec2612d51d46c3d15a2bc8784f0865b75db6b6a5a4289250a0e006aa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c08f5dba4bee72ecd4a062ab5ed2dab2
SHA17ca945fa80959cd2800a703bfa60659694cfc702
SHA25627f54be207c97e9cbf98e4fb66058aed93dd182a0de11c9967c87911a5453a1a
SHA512e22e5146ac7762c6042ba508a689474881626a92bcb58f9e5b1565fa99465239946ff7cc1b76977159dc0470414301c5af7006601f1834e245da0c1017b4b8bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d38f2eedaa0f6ed152228053b51ac0a
SHA10d4d00c478b8c64d32520b97637142ca5745cccd
SHA256e08496067eea0488a352b44a1035d94240213b7d5bd33314ba42572cf31d8ad8
SHA512242449a8f1f30afa21bbe3ac4685d4f17e01af250f23b1867c8eeeb9d300366a5c8203c16fc63064245eca1a39b607a2929caa549b98cf3738d5792a1f697087
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df0c977dc8bfe6d8ba35db5b0d25aec3
SHA11fcb0a8a4de662369ec6980955ae219b14861c78
SHA256d3f4eb084001f8ac445cd752a3394c33fd4d4e66a9cf346cb320c4812307c33c
SHA512f32ba764ebf4a8b91c715588ce3a7b0e3e1212566194768d6a0e50d8f11a576ba7d2b9043ff004f2c374e4049971dcb59a82d4da8da5f00dbfb9c557864b3ccd
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{316FF391-FB07-11EF-8C6C-D686196AC2C0}.dat
Filesize5KB
MD57566ff0ed4cf6db9661c4b5a65ca7367
SHA19f9eb837a7b6b2bb3fca16cdc8777c234690273f
SHA256c06feb0278c407e0f6adbdbbcffe0ccf200d49a0ffcba2d878ed36818c6b2f92
SHA5120795a3c5278cf626de9b755e99531b48d26983969199be534cabeb7c0d0f88cc30677ec733604d3bd111dd7158e98feb86cb928fee9b2ee96f1d3bcb3e2b262f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
105KB
MD5d5ca6e1f080abc64bbb11e098acbeabb
SHA11849634bf5a65e1baddddd4452c99dfa003e2647
SHA25630193b5ccf8a1834eac3502ef165350ab74b107451145f3d2937fdf24b9eceae
SHA512aa57ce51de38af6212d7339c4baac543a54b0f527621b0ef9e78eca5e5699e8508a154f54f8ac04135527d8417275eeee72a502a362547575699330cc756b161