Analysis

  • max time kernel
    150s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    05/08/2023, 13:31

General

  • Target

    72242a2ceac1573f23a34cb4e0cd6d69_backswap_icedid_JC.exe

  • Size

    2.6MB

  • MD5

    72242a2ceac1573f23a34cb4e0cd6d69

  • SHA1

    137dec2d6b87a76affd3e7a359d37bd191f63d81

  • SHA256

    61b5303feb469223d5a3891c190e9b0e49786cc59408074e8f5e0ea6101ba257

  • SHA512

    da8117ca7e9290af8f177e126ff8a6b802d4ba65e110533ee6a084a962cc3c182deb8b10b34b06743ef1b685d75f2d368d3f63a2aa8e533b4478d92bfbccb46a

  • SSDEEP

    24576:5nWYXDaHMv6CorjqnyPQGzh0JONZejOuC+e4mOzrvxiI3ENyesg/jHLxQVIxX6LP:tl1vqjdPQRw/D4mizA0dizLrB51vG

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • AutoIT Executable 3 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 11 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • NTFS ADS 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\72242a2ceac1573f23a34cb4e0cd6d69_backswap_icedid_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\72242a2ceac1573f23a34cb4e0cd6d69_backswap_icedid_JC.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • NTFS ADS
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2500
    • C:\Program Files\64Âë¸ßÇåÍøÂçµçÊÓv2.4.2.exe
      "C:\Program Files\64Âë¸ßÇåÍøÂçµçÊÓv2.4.2.exe"
      2⤵
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Modifies system certificate store
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2376
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 C:\WINDOWS\Media\ActiveX.ocx /s
      2⤵
        PID:824

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files\64Âë¸ßÇåÍøÂçµçÊÓv2.4.2.exe

            Filesize

            642KB

            MD5

            d871f2c4088b8b4044a06352378e5f47

            SHA1

            1ac52a4fa15aaee20307c475ff0ef95351418074

            SHA256

            bfc4f31183a35555e19d2095a743129b20949acbcb5ea43a5fbfaa0b7e624bfa

            SHA512

            294a0cc0d8f89b077821ed97891dc693bdb6dd3f7b4436840f78e5663ece817cf6400d782f31ae33b8fdbbffa9c1691e2411fc9240d2100c2c1e2a4be71b2d68

          • C:\Program Files\64Âë¸ßÇåÍøÂçµçÊÓv2.4.2.exe

            Filesize

            642KB

            MD5

            d871f2c4088b8b4044a06352378e5f47

            SHA1

            1ac52a4fa15aaee20307c475ff0ef95351418074

            SHA256

            bfc4f31183a35555e19d2095a743129b20949acbcb5ea43a5fbfaa0b7e624bfa

            SHA512

            294a0cc0d8f89b077821ed97891dc693bdb6dd3f7b4436840f78e5663ece817cf6400d782f31ae33b8fdbbffa9c1691e2411fc9240d2100c2c1e2a4be71b2d68

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            24935eb0395511c3047e9c38b71afbf1

            SHA1

            de10463bb696ab8e7aac4d4d70f6f9c8c912515f

            SHA256

            98d65b05e0bd1b6699a7343b722fe452f26ee8fb6c2f4215e4e227251f76bd80

            SHA512

            d040de50461dcc9975705b0727d8a11e522a94f6dcef307b05bc2f9fe8cc6d3dea8c4bdf56c9a2f1179b1c846459d8d95e73f0d4f36701257c287248d286e182

          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\5H6G87BW\live.64ma[1].xml

            Filesize

            3KB

            MD5

            d3825f3b83b5dfe9a05458da8493c353

            SHA1

            0f13aec0f3da6c365dfe2c81f599cfc220526440

            SHA256

            e7a0b2d8b5eab4ff2baffca7ef0f74d9f1def5e811156699d2e5aa17839c7c62

            SHA512

            7a4ab1fc55bd5fee73b445cce91dae2603253f7307a41c8478ebb91d444f6436d3d860dedf1d9fd617d5112c5f2625cd9d9a553b845a72b030410e078a41f29c

          • C:\Users\Admin\AppData\Local\Temp\Cab8C4A.tmp

            Filesize

            62KB

            MD5

            3ac860860707baaf32469fa7cc7c0192

            SHA1

            c33c2acdaba0e6fa41fd2f00f186804722477639

            SHA256

            d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

            SHA512

            d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

          • C:\Users\Admin\AppData\Local\Temp\Tar8EAE.tmp

            Filesize

            164KB

            MD5

            4ff65ad929cd9a367680e0e5b1c08166

            SHA1

            c0af0d4396bd1f15c45f39d3b849ba444233b3a2

            SHA256

            c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

            SHA512

            f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

          • C:\WINDOWS\Media\ActiveX.ocx

            Filesize

            12B

            MD5

            a09e8cfaa57affad4369c03db40e1612

            SHA1

            a5c0085626d5699e2387181ff3b6b7516c7f274d

            SHA256

            3e996c0dc018a5445ff589b70e7703c41e2d25251912594eb987b4a8ba02208a

            SHA512

            db51d0d74704a82523186c00605e1eef755193091ae27e493c59f8923c83850d327b9f9cd222972d4c276749292c3da602a6714bf88e2fe49a8bb5160daf9aa7

          • \Program Files\64Âë¸ßÇåÍøÂçµçÊÓv2.4.2.exe

            Filesize

            642KB

            MD5

            d871f2c4088b8b4044a06352378e5f47

            SHA1

            1ac52a4fa15aaee20307c475ff0ef95351418074

            SHA256

            bfc4f31183a35555e19d2095a743129b20949acbcb5ea43a5fbfaa0b7e624bfa

            SHA512

            294a0cc0d8f89b077821ed97891dc693bdb6dd3f7b4436840f78e5663ece817cf6400d782f31ae33b8fdbbffa9c1691e2411fc9240d2100c2c1e2a4be71b2d68