Analysis
-
max time kernel
17s -
max time network
19s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
30/03/2025, 11:09
Static task
static1
1 signatures
General
-
Target
1240f20fa9ae95089b4991382cf8b080e093127390077d1cb8361ab62402ac81.exe
-
Size
105KB
-
MD5
d9a174eb7d7d41950eff7f1b1f1c15a3
-
SHA1
a3af2066f6b98f8ca05401c74d496cb152297505
-
SHA256
1240f20fa9ae95089b4991382cf8b080e093127390077d1cb8361ab62402ac81
-
SHA512
078680ab7b52eef380bb88e823ba1a2d90a75deb6fcb634d8cc01f9bf3b3707f3b91fc936b4223f9a2f7230bbbcfcb3dd9b9db30dfc02ec9b0184fa5ec281ce3
-
SSDEEP
1536:1yw8QmRamC/SRXkTiKeCMdto9sHxy4sOaHhS/3VQxwi:1yw8DKSyVeCqtncOIw6wi
Malware Config
Extracted
Family
icedid
C2
connuwedro.xyz
Signatures
-
Icedid family
-
IcedID First Stage Loader 2 IoCs
resource yara_rule behavioral1/memory/2000-0-0x00000000004A0000-0x00000000004A3000-memory.dmp IcedidFirstLoader behavioral1/memory/2000-1-0x00000000004C0000-0x00000000004C6000-memory.dmp IcedidFirstLoader -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1240f20fa9ae95089b4991382cf8b080e093127390077d1cb8361ab62402ac81.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 5952 taskmgr.exe 5952 taskmgr.exe 5952 taskmgr.exe 5952 taskmgr.exe 5952 taskmgr.exe 5952 taskmgr.exe 5952 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5952 taskmgr.exe Token: SeSystemProfilePrivilege 5952 taskmgr.exe Token: SeCreateGlobalPrivilege 5952 taskmgr.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 5952 taskmgr.exe 5952 taskmgr.exe 5952 taskmgr.exe 5952 taskmgr.exe 5952 taskmgr.exe 5952 taskmgr.exe 5952 taskmgr.exe 5952 taskmgr.exe 5952 taskmgr.exe 5952 taskmgr.exe 5952 taskmgr.exe 5952 taskmgr.exe 5952 taskmgr.exe 5952 taskmgr.exe 5952 taskmgr.exe 5952 taskmgr.exe 5952 taskmgr.exe 5952 taskmgr.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 5952 taskmgr.exe 5952 taskmgr.exe 5952 taskmgr.exe 5952 taskmgr.exe 5952 taskmgr.exe 5952 taskmgr.exe 5952 taskmgr.exe 5952 taskmgr.exe 5952 taskmgr.exe 5952 taskmgr.exe 5952 taskmgr.exe 5952 taskmgr.exe 5952 taskmgr.exe 5952 taskmgr.exe 5952 taskmgr.exe 5952 taskmgr.exe 5952 taskmgr.exe 5952 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1240f20fa9ae95089b4991382cf8b080e093127390077d1cb8361ab62402ac81.exe"C:\Users\Admin\AppData\Local\Temp\1240f20fa9ae95089b4991382cf8b080e093127390077d1cb8361ab62402ac81.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2000
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5952