Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
29-06-2024 14:23
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe
Resource
win7-20240611-en
General
-
Target
2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe
-
Size
21.8MB
-
MD5
1cd9fc4cf9f85f777e60a994fc705208
-
SHA1
ea129535780075708285c11221a7f4e5aad22059
-
SHA256
2fa0119c42af70f6df2723082af718a9be89e3b88a1e748b09ce61e0ece87441
-
SHA512
18a58b8761c37ba0bd5f69ea9f67c956f9a02bf3cd056c745a653d12e7865dea5aa62ef7619143fdb91cb664d9183fa0a05bb766e291e398a8193f576ce44b53
-
SSDEEP
393216:NIIgLGRXzFimEAJ+RPJ3mxyR1GHep4bogBTihxn5njHmVlECtFM3W0:OIgLwRifS+RB2xyR1G+prTxn5SVlTtF0
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 3 TTPs 3 IoCs
Processes:
2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe -
Processes:
2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe -
Processes:
2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe -
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality 29 IoCs
Processes:
resource yara_rule behavioral1/memory/1724-0-0x0000000003570000-0x00000000045FE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1724-2-0x0000000003570000-0x00000000045FE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1724-7-0x0000000003570000-0x00000000045FE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1724-9-0x0000000003570000-0x00000000045FE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1724-8-0x0000000003570000-0x00000000045FE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1724-6-0x0000000003570000-0x00000000045FE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1724-10-0x0000000003570000-0x00000000045FE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1724-5-0x0000000003570000-0x00000000045FE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1724-4-0x0000000003570000-0x00000000045FE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1724-27-0x0000000003570000-0x00000000045FE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1724-28-0x0000000003570000-0x00000000045FE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1724-29-0x0000000003570000-0x00000000045FE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1724-30-0x0000000003570000-0x00000000045FE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1724-31-0x0000000003570000-0x00000000045FE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1724-33-0x0000000003570000-0x00000000045FE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1724-34-0x0000000003570000-0x00000000045FE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1724-35-0x0000000003570000-0x00000000045FE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1724-38-0x0000000003570000-0x00000000045FE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1724-40-0x0000000003570000-0x00000000045FE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1724-47-0x0000000003570000-0x00000000045FE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1724-46-0x0000000003570000-0x00000000045FE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1724-50-0x0000000003570000-0x00000000045FE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1724-53-0x0000000003570000-0x00000000045FE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1724-52-0x0000000003570000-0x00000000045FE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1724-55-0x0000000003570000-0x00000000045FE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1724-59-0x0000000003570000-0x00000000045FE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1724-72-0x0000000003570000-0x00000000045FE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1724-75-0x0000000003570000-0x00000000045FE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/1724-76-0x0000000003570000-0x00000000045FE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine -
UPX dump on OEP (original entry point) 29 IoCs
Processes:
resource yara_rule behavioral1/memory/1724-0-0x0000000003570000-0x00000000045FE000-memory.dmp UPX behavioral1/memory/1724-2-0x0000000003570000-0x00000000045FE000-memory.dmp UPX behavioral1/memory/1724-7-0x0000000003570000-0x00000000045FE000-memory.dmp UPX behavioral1/memory/1724-9-0x0000000003570000-0x00000000045FE000-memory.dmp UPX behavioral1/memory/1724-8-0x0000000003570000-0x00000000045FE000-memory.dmp UPX behavioral1/memory/1724-6-0x0000000003570000-0x00000000045FE000-memory.dmp UPX behavioral1/memory/1724-10-0x0000000003570000-0x00000000045FE000-memory.dmp UPX behavioral1/memory/1724-5-0x0000000003570000-0x00000000045FE000-memory.dmp UPX behavioral1/memory/1724-4-0x0000000003570000-0x00000000045FE000-memory.dmp UPX behavioral1/memory/1724-27-0x0000000003570000-0x00000000045FE000-memory.dmp UPX behavioral1/memory/1724-28-0x0000000003570000-0x00000000045FE000-memory.dmp UPX behavioral1/memory/1724-29-0x0000000003570000-0x00000000045FE000-memory.dmp UPX behavioral1/memory/1724-30-0x0000000003570000-0x00000000045FE000-memory.dmp UPX behavioral1/memory/1724-31-0x0000000003570000-0x00000000045FE000-memory.dmp UPX behavioral1/memory/1724-33-0x0000000003570000-0x00000000045FE000-memory.dmp UPX behavioral1/memory/1724-34-0x0000000003570000-0x00000000045FE000-memory.dmp UPX behavioral1/memory/1724-35-0x0000000003570000-0x00000000045FE000-memory.dmp UPX behavioral1/memory/1724-38-0x0000000003570000-0x00000000045FE000-memory.dmp UPX behavioral1/memory/1724-40-0x0000000003570000-0x00000000045FE000-memory.dmp UPX behavioral1/memory/1724-47-0x0000000003570000-0x00000000045FE000-memory.dmp UPX behavioral1/memory/1724-46-0x0000000003570000-0x00000000045FE000-memory.dmp UPX behavioral1/memory/1724-50-0x0000000003570000-0x00000000045FE000-memory.dmp UPX behavioral1/memory/1724-53-0x0000000003570000-0x00000000045FE000-memory.dmp UPX behavioral1/memory/1724-52-0x0000000003570000-0x00000000045FE000-memory.dmp UPX behavioral1/memory/1724-55-0x0000000003570000-0x00000000045FE000-memory.dmp UPX behavioral1/memory/1724-59-0x0000000003570000-0x00000000045FE000-memory.dmp UPX behavioral1/memory/1724-72-0x0000000003570000-0x00000000045FE000-memory.dmp UPX behavioral1/memory/1724-75-0x0000000003570000-0x00000000045FE000-memory.dmp UPX behavioral1/memory/1724-76-0x0000000003570000-0x00000000045FE000-memory.dmp UPX -
Processes:
resource yara_rule behavioral1/memory/1724-0-0x0000000003570000-0x00000000045FE000-memory.dmp upx behavioral1/memory/1724-2-0x0000000003570000-0x00000000045FE000-memory.dmp upx behavioral1/memory/1724-7-0x0000000003570000-0x00000000045FE000-memory.dmp upx behavioral1/memory/1724-9-0x0000000003570000-0x00000000045FE000-memory.dmp upx behavioral1/memory/1724-8-0x0000000003570000-0x00000000045FE000-memory.dmp upx behavioral1/memory/1724-6-0x0000000003570000-0x00000000045FE000-memory.dmp upx behavioral1/memory/1724-10-0x0000000003570000-0x00000000045FE000-memory.dmp upx behavioral1/memory/1724-5-0x0000000003570000-0x00000000045FE000-memory.dmp upx behavioral1/memory/1724-4-0x0000000003570000-0x00000000045FE000-memory.dmp upx behavioral1/memory/1724-27-0x0000000003570000-0x00000000045FE000-memory.dmp upx behavioral1/memory/1724-28-0x0000000003570000-0x00000000045FE000-memory.dmp upx behavioral1/memory/1724-29-0x0000000003570000-0x00000000045FE000-memory.dmp upx behavioral1/memory/1724-30-0x0000000003570000-0x00000000045FE000-memory.dmp upx behavioral1/memory/1724-31-0x0000000003570000-0x00000000045FE000-memory.dmp upx behavioral1/memory/1724-33-0x0000000003570000-0x00000000045FE000-memory.dmp upx behavioral1/memory/1724-34-0x0000000003570000-0x00000000045FE000-memory.dmp upx behavioral1/memory/1724-35-0x0000000003570000-0x00000000045FE000-memory.dmp upx behavioral1/memory/1724-38-0x0000000003570000-0x00000000045FE000-memory.dmp upx behavioral1/memory/1724-40-0x0000000003570000-0x00000000045FE000-memory.dmp upx behavioral1/memory/1724-47-0x0000000003570000-0x00000000045FE000-memory.dmp upx behavioral1/memory/1724-46-0x0000000003570000-0x00000000045FE000-memory.dmp upx behavioral1/memory/1724-50-0x0000000003570000-0x00000000045FE000-memory.dmp upx behavioral1/memory/1724-53-0x0000000003570000-0x00000000045FE000-memory.dmp upx behavioral1/memory/1724-52-0x0000000003570000-0x00000000045FE000-memory.dmp upx behavioral1/memory/1724-55-0x0000000003570000-0x00000000045FE000-memory.dmp upx behavioral1/memory/1724-59-0x0000000003570000-0x00000000045FE000-memory.dmp upx behavioral1/memory/1724-72-0x0000000003570000-0x00000000045FE000-memory.dmp upx behavioral1/memory/1724-75-0x0000000003570000-0x00000000045FE000-memory.dmp upx behavioral1/memory/1724-76-0x0000000003570000-0x00000000045FE000-memory.dmp upx -
Processes:
2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe -
Processes:
2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe -
Enumerates connected drives 3 TTPs 20 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exedescription ioc process File opened (read-only) \??\K: 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened (read-only) \??\M: 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened (read-only) \??\U: 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened (read-only) \??\X: 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened (read-only) \??\G: 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened (read-only) \??\L: 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened (read-only) \??\N: 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened (read-only) \??\O: 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened (read-only) \??\P: 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened (read-only) \??\R: 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened (read-only) \??\W: 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened (read-only) \??\Z: 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened (read-only) \??\E: 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened (read-only) \??\H: 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened (read-only) \??\J: 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened (read-only) \??\S: 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened (read-only) \??\V: 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened (read-only) \??\I: 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened (read-only) \??\T: 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened (read-only) \??\Y: 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exedescription ioc process File opened for modification C:\autorun.inf 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened for modification F:\autorun.inf 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe -
Drops file in Program Files directory 9 IoCs
Processes:
2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exedescription ioc process File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7ZG.EXE 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zG.exe 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened for modification C:\PROGRAM FILES\7-ZIP\Uninstall.exe 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7Z.EXE 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7ZFM.EXE 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zFM.exe 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened for modification C:\PROGRAM FILES\7-ZIP\UNINSTALL.EXE 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe -
Drops file in Windows directory 1 IoCs
Processes:
2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exedescription ioc process File opened for modification C:\Windows\SYSTEM.INI 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exepid process 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe -
Suspicious behavior: MapViewOfSection 21 IoCs
Processes:
2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exepid process 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exedescription pid process Token: SeDebugPrivilege 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exepid process 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exedescription pid process target process PID 1724 wrote to memory of 372 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe wininit.exe PID 1724 wrote to memory of 372 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe wininit.exe PID 1724 wrote to memory of 372 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe wininit.exe PID 1724 wrote to memory of 372 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe wininit.exe PID 1724 wrote to memory of 372 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe wininit.exe PID 1724 wrote to memory of 372 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe wininit.exe PID 1724 wrote to memory of 372 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe wininit.exe PID 1724 wrote to memory of 384 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe csrss.exe PID 1724 wrote to memory of 384 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe csrss.exe PID 1724 wrote to memory of 384 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe csrss.exe PID 1724 wrote to memory of 384 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe csrss.exe PID 1724 wrote to memory of 384 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe csrss.exe PID 1724 wrote to memory of 384 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe csrss.exe PID 1724 wrote to memory of 384 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe csrss.exe PID 1724 wrote to memory of 420 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe winlogon.exe PID 1724 wrote to memory of 420 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe winlogon.exe PID 1724 wrote to memory of 420 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe winlogon.exe PID 1724 wrote to memory of 420 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe winlogon.exe PID 1724 wrote to memory of 420 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe winlogon.exe PID 1724 wrote to memory of 420 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe winlogon.exe PID 1724 wrote to memory of 420 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe winlogon.exe PID 1724 wrote to memory of 464 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe services.exe PID 1724 wrote to memory of 464 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe services.exe PID 1724 wrote to memory of 464 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe services.exe PID 1724 wrote to memory of 464 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe services.exe PID 1724 wrote to memory of 464 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe services.exe PID 1724 wrote to memory of 464 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe services.exe PID 1724 wrote to memory of 464 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe services.exe PID 1724 wrote to memory of 480 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe lsass.exe PID 1724 wrote to memory of 480 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe lsass.exe PID 1724 wrote to memory of 480 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe lsass.exe PID 1724 wrote to memory of 480 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe lsass.exe PID 1724 wrote to memory of 480 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe lsass.exe PID 1724 wrote to memory of 480 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe lsass.exe PID 1724 wrote to memory of 480 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe lsass.exe PID 1724 wrote to memory of 488 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe lsm.exe PID 1724 wrote to memory of 488 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe lsm.exe PID 1724 wrote to memory of 488 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe lsm.exe PID 1724 wrote to memory of 488 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe lsm.exe PID 1724 wrote to memory of 488 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe lsm.exe PID 1724 wrote to memory of 488 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe lsm.exe PID 1724 wrote to memory of 488 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe lsm.exe PID 1724 wrote to memory of 584 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 1724 wrote to memory of 584 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 1724 wrote to memory of 584 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 1724 wrote to memory of 584 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 1724 wrote to memory of 584 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 1724 wrote to memory of 584 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 1724 wrote to memory of 584 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 1724 wrote to memory of 664 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 1724 wrote to memory of 664 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 1724 wrote to memory of 664 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 1724 wrote to memory of 664 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 1724 wrote to memory of 664 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 1724 wrote to memory of 664 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 1724 wrote to memory of 664 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 1724 wrote to memory of 752 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 1724 wrote to memory of 752 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 1724 wrote to memory of 752 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 1724 wrote to memory of 752 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 1724 wrote to memory of 752 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 1724 wrote to memory of 752 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 1724 wrote to memory of 752 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 1724 wrote to memory of 796 1724 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe
Processes
-
C:\Windows\system32\wininit.exewininit.exe1⤵
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}4⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"4⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Impair Defenses
4Disable or Modify Tools
3Disable or Modify System Firewall
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\winotbnp.exeFilesize
105KB
MD503df39082249a13b04bb7d5c3ffc7886
SHA1f8f1dd0a35468c2f0d7cff264e863b551aee5b82
SHA256a18e36bbf60a32508ef042bf7c6ac3e4d79aefb4f7ccc93bb78d05283945dadb
SHA5125f78ab0acd95b14d28502d69e8339482268b56ca9820a6724dd01c58654f40e4938f8b24410d9cbcae9bef54b39b793b9674ec59ebcc7e47fad2511ef2ec3258
-
memory/1212-11-0x0000000000490000-0x0000000000492000-memory.dmpFilesize
8KB
-
memory/1724-27-0x0000000003570000-0x00000000045FE000-memory.dmpFilesize
16.6MB
-
memory/1724-75-0x0000000003570000-0x00000000045FE000-memory.dmpFilesize
16.6MB
-
memory/1724-20-0x0000000001AF0000-0x0000000001AF1000-memory.dmpFilesize
4KB
-
memory/1724-29-0x0000000003570000-0x00000000045FE000-memory.dmpFilesize
16.6MB
-
memory/1724-0-0x0000000003570000-0x00000000045FE000-memory.dmpFilesize
16.6MB
-
memory/1724-24-0x0000000001AD0000-0x0000000001AD2000-memory.dmpFilesize
8KB
-
memory/1724-2-0x0000000003570000-0x00000000045FE000-memory.dmpFilesize
16.6MB
-
memory/1724-7-0x0000000003570000-0x00000000045FE000-memory.dmpFilesize
16.6MB
-
memory/1724-9-0x0000000003570000-0x00000000045FE000-memory.dmpFilesize
16.6MB
-
memory/1724-25-0x0000000001F70000-0x0000000003533000-memory.dmpFilesize
21.8MB
-
memory/1724-8-0x0000000003570000-0x00000000045FE000-memory.dmpFilesize
16.6MB
-
memory/1724-26-0x0000000001F70000-0x0000000003533000-memory.dmpFilesize
21.8MB
-
memory/1724-6-0x0000000003570000-0x00000000045FE000-memory.dmpFilesize
16.6MB
-
memory/1724-10-0x0000000003570000-0x00000000045FE000-memory.dmpFilesize
16.6MB
-
memory/1724-5-0x0000000003570000-0x00000000045FE000-memory.dmpFilesize
16.6MB
-
memory/1724-4-0x0000000003570000-0x00000000045FE000-memory.dmpFilesize
16.6MB
-
memory/1724-3-0x0000000000400000-0x00000000019C3000-memory.dmpFilesize
21.8MB
-
memory/1724-28-0x0000000003570000-0x00000000045FE000-memory.dmpFilesize
16.6MB
-
memory/1724-23-0x0000000001F70000-0x0000000003533000-memory.dmpFilesize
21.8MB
-
memory/1724-19-0x0000000001AD0000-0x0000000001AD2000-memory.dmpFilesize
8KB
-
memory/1724-33-0x0000000003570000-0x00000000045FE000-memory.dmpFilesize
16.6MB
-
memory/1724-31-0x0000000003570000-0x00000000045FE000-memory.dmpFilesize
16.6MB
-
memory/1724-34-0x0000000003570000-0x00000000045FE000-memory.dmpFilesize
16.6MB
-
memory/1724-35-0x0000000003570000-0x00000000045FE000-memory.dmpFilesize
16.6MB
-
memory/1724-38-0x0000000003570000-0x00000000045FE000-memory.dmpFilesize
16.6MB
-
memory/1724-40-0x0000000003570000-0x00000000045FE000-memory.dmpFilesize
16.6MB
-
memory/1724-47-0x0000000003570000-0x00000000045FE000-memory.dmpFilesize
16.6MB
-
memory/1724-46-0x0000000003570000-0x00000000045FE000-memory.dmpFilesize
16.6MB
-
memory/1724-50-0x0000000003570000-0x00000000045FE000-memory.dmpFilesize
16.6MB
-
memory/1724-53-0x0000000003570000-0x00000000045FE000-memory.dmpFilesize
16.6MB
-
memory/1724-52-0x0000000003570000-0x00000000045FE000-memory.dmpFilesize
16.6MB
-
memory/1724-55-0x0000000003570000-0x00000000045FE000-memory.dmpFilesize
16.6MB
-
memory/1724-59-0x0000000003570000-0x00000000045FE000-memory.dmpFilesize
16.6MB
-
memory/1724-22-0x0000000001AF0000-0x0000000001AF1000-memory.dmpFilesize
4KB
-
memory/1724-72-0x0000000003570000-0x00000000045FE000-memory.dmpFilesize
16.6MB
-
memory/1724-30-0x0000000003570000-0x00000000045FE000-memory.dmpFilesize
16.6MB
-
memory/1724-76-0x0000000003570000-0x00000000045FE000-memory.dmpFilesize
16.6MB