Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/03/2025, 02:03

General

  • Target

    2025-03-08_ceca87332b6baef1d4362835c645fde4_icedid.exe

  • Size

    1.2MB

  • MD5

    ceca87332b6baef1d4362835c645fde4

  • SHA1

    42e1397a1919374ca330e89c56e950be9774a7f1

  • SHA256

    3078bfd761b290630321b44bf7e068922cb3ed191c98785d9f6048e5d342e346

  • SHA512

    12ad155df88d18bc250bdca709d63e2615316d046bcf8fdd9e0daab0f1d71d87e91992d4fb502d7131de061540429ad687652e05cda59733ba2e1c0d8f814714

  • SSDEEP

    24576:RbndcEBtMIgeOZ+FzZ5flLBVv0p8o30k65zQtqBG3G3ndFBex92JeDty/IZs:tndJBth/t59Fp9aDiQc6YdFBex92Jep8

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 46 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-03-08_ceca87332b6baef1d4362835c645fde4_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-03-08_ceca87332b6baef1d4362835c645fde4_icedid.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1264
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\SysWOW64\rundll32.exe C:\ProgramData\appsoft\\install32.dll,installsvc installtrojan
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4264
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c start C:\Windows\system32
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        PID:4700
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\delself.bat"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3684
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:3460
  • C:\Windows\explorer.exe
    C:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding
    1⤵
    • Drops file in System32 directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3488
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {3eef301f-b596-4c0b-bd92-013beafce793} -Embedding
    1⤵
      PID:4340
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:4832
      • C:\Windows\system32\SearchIndexer.exe
        C:\Windows\system32\SearchIndexer.exe /Embedding
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1132
        • C:\Windows\system32\SearchProtocolHost.exe
          "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
          2⤵
          • Modifies data under HKEY_USERS
          PID:2084
        • C:\Windows\system32\SearchFilterHost.exe
          "C:\Windows\system32\SearchFilterHost.exe" 0 800 804 812 8192 808 784
          2⤵
          • Modifies data under HKEY_USERS
          PID:1304
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {515980c3-57fe-4c1e-a561-730dd256ab98} -Embedding
        1⤵
        • Suspicious use of FindShellTrayWindow
        PID:4972

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\appsoft\install32.dat

        Filesize

        279KB

        MD5

        02adb5a63d5d4fa74ddcc9e3b6976624

        SHA1

        cbb6b7e8e537dad3892361f26837396ea9695848

        SHA256

        d40e9f8176766b4a31ac9807837c3be0e957b755b6f3dd0eb8caf44aeb032060

        SHA512

        d3458c37c9892868e63dddadf26686ba30751a40bf529fc51df0d936fcede8145446a611a82e737ee36adf55b48f73f3a72f8ce381fc880a879fec23b9c1592a

      • C:\ProgramData\appsoft\install32.dll

        Filesize

        52KB

        MD5

        b39caefae13d0dc0344380b9b19c33c4

        SHA1

        6fe41d9026112599721916a251169ca360cc18e8

        SHA256

        766cee16390c18a85fb3ec9b740986c8ab022cbc35660ff60fba6e72050d417c

        SHA512

        76136b62ebfd8c969a6bf97c6e76127b67697ec0c7da1068c9951e6be4f8c8960d57103ad429f91ddc43702debbca069ba32ac2b6c179902111f339e7090e02a

      • C:\ProgramData\appsoft\install64.dll

        Filesize

        66KB

        MD5

        f272c73937cc5ef633dfcce3f118c6e0

        SHA1

        0cd50cce9735baadb376ea5a7102123a7ab1c390

        SHA256

        242cfd9271d9b6b15128cbbd6e000ecdbce1bb6e130991cb2b8d40f1751483cc

        SHA512

        309d7caaf3c71e06288fb5d89749e28b6328262522d0524fc6082458ac146ec7014bfc4463022259d478eb8a9f97548489f014d6e2f8f180d5f047908197ee06

      • C:\ProgramData\resmon.resmoncfg

        Filesize

        1KB

        MD5

        8f490dc7ec6782d4fd16f67c1df1c5f3

        SHA1

        038e54e03f3b8faf60c69a6d4c073df99bcb5953

        SHA256

        b448c3c879a662e82f1e9dca21c53abd2c0bd2f7aab1631918a04e910e41e5ed

        SHA512

        f1e9ab048bf6ea22f9d23d080ba10b7dcf7b395f09d4f32e39dbb9f03ab75ce61508b449f4d01e9c45dd236f1f43fc394ebd8facf02089925ef3acae55deaa7c

      • C:\Users\Admin\AppData\Local\Temp\delself.bat

        Filesize

        307B

        MD5

        ee84b4ec9e7d5d14f725ba596455147f

        SHA1

        5f9e205ffb52d2293821524be39a0d165dfe6a6c

        SHA256

        e9b25efc10a6dea19e2b88a425f7ebcaaff90cebab175e8a1f12a2017892ba1d

        SHA512

        0c1875f2c8c447adec41da1d5a4a457a35a05be8505b4bc302967843da793e5689ad9e884c727fbfe5504b80e4e1d231e4e08bbe0f43799c64c9b410b31cdac6

      • memory/1132-74-0x00000191EDC70000-0x00000191EDC78000-memory.dmp

        Filesize

        32KB

      • memory/1132-77-0x00000191EDC60000-0x00000191EDC68000-memory.dmp

        Filesize

        32KB

      • memory/1132-75-0x00000191EDC60000-0x00000191EDC61000-memory.dmp

        Filesize

        4KB

      • memory/1132-70-0x00000191ECA50000-0x00000191ECA58000-memory.dmp

        Filesize

        32KB

      • memory/1132-54-0x00000191E8560000-0x00000191E8570000-memory.dmp

        Filesize

        64KB

      • memory/1132-38-0x00000191E8460000-0x00000191E8470000-memory.dmp

        Filesize

        64KB

      • memory/1264-1-0x0000000002510000-0x0000000002511000-memory.dmp

        Filesize

        4KB

      • memory/1264-2-0x0000000002520000-0x0000000002521000-memory.dmp

        Filesize

        4KB

      • memory/1304-83-0x0000014EC1700000-0x0000014EC1710000-memory.dmp

        Filesize

        64KB

      • memory/1304-105-0x0000014EC1700000-0x0000014EC1710000-memory.dmp

        Filesize

        64KB

      • memory/1304-112-0x0000014EC1700000-0x0000014EC1710000-memory.dmp

        Filesize

        64KB

      • memory/1304-110-0x0000014EC1700000-0x0000014EC1710000-memory.dmp

        Filesize

        64KB

      • memory/1304-79-0x0000014EC1700000-0x0000014EC1710000-memory.dmp

        Filesize

        64KB

      • memory/1304-80-0x0000014EC1700000-0x0000014EC1710000-memory.dmp

        Filesize

        64KB

      • memory/1304-81-0x0000014EC1700000-0x0000014EC1710000-memory.dmp

        Filesize

        64KB

      • memory/1304-82-0x0000014EC1700000-0x0000014EC1710000-memory.dmp

        Filesize

        64KB

      • memory/1304-84-0x0000014EC1700000-0x0000014EC1710000-memory.dmp

        Filesize

        64KB

      • memory/1304-111-0x0000014EC1700000-0x0000014EC1710000-memory.dmp

        Filesize

        64KB

      • memory/1304-85-0x0000014EC1700000-0x0000014EC1710000-memory.dmp

        Filesize

        64KB

      • memory/1304-87-0x0000014EC1700000-0x0000014EC1710000-memory.dmp

        Filesize

        64KB

      • memory/1304-86-0x0000014EC1700000-0x0000014EC1710000-memory.dmp

        Filesize

        64KB

      • memory/1304-94-0x0000014EC1700000-0x0000014EC1710000-memory.dmp

        Filesize

        64KB

      • memory/1304-93-0x0000014EC1700000-0x0000014EC1710000-memory.dmp

        Filesize

        64KB

      • memory/1304-92-0x0000014EC1700000-0x0000014EC1710000-memory.dmp

        Filesize

        64KB

      • memory/1304-91-0x0000014EC1700000-0x0000014EC1710000-memory.dmp

        Filesize

        64KB

      • memory/1304-90-0x0000014EC1700000-0x0000014EC1710000-memory.dmp

        Filesize

        64KB

      • memory/1304-89-0x0000014EC1700000-0x0000014EC1710000-memory.dmp

        Filesize

        64KB

      • memory/1304-88-0x0000014EC1700000-0x0000014EC1710000-memory.dmp

        Filesize

        64KB

      • memory/1304-101-0x0000014EC1700000-0x0000014EC1710000-memory.dmp

        Filesize

        64KB

      • memory/1304-102-0x0000014EC1700000-0x0000014EC1710000-memory.dmp

        Filesize

        64KB

      • memory/1304-103-0x0000014EC1700000-0x0000014EC1710000-memory.dmp

        Filesize

        64KB

      • memory/1304-106-0x0000014EC1700000-0x0000014EC1710000-memory.dmp

        Filesize

        64KB

      • memory/1304-104-0x0000014EC1700000-0x0000014EC1710000-memory.dmp

        Filesize

        64KB

      • memory/1304-109-0x0000014EC1700000-0x0000014EC1710000-memory.dmp

        Filesize

        64KB

      • memory/1304-107-0x0000014EC1700000-0x0000014EC1710000-memory.dmp

        Filesize

        64KB

      • memory/1304-108-0x0000014EC1700000-0x0000014EC1710000-memory.dmp

        Filesize

        64KB

      • memory/4264-30-0x0000000001260000-0x0000000001261000-memory.dmp

        Filesize

        4KB

      • memory/4264-29-0x0000000002C90000-0x0000000002CD6000-memory.dmp

        Filesize

        280KB

      • memory/4264-32-0x0000000002D70000-0x0000000002DB0000-memory.dmp

        Filesize

        256KB

      • memory/4264-31-0x0000000002D30000-0x0000000002D6E000-memory.dmp

        Filesize

        248KB

      • memory/4264-135-0x0000000002D70000-0x0000000002DB0000-memory.dmp

        Filesize

        256KB