Analysis

  • max time kernel
    149s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    07/01/2024, 12:14

General

  • Target

    2024-01-06_ae81bc18ce346f3f98ec02f9f2b330f1_backswap_icedid.exe

  • Size

    2.6MB

  • MD5

    ae81bc18ce346f3f98ec02f9f2b330f1

  • SHA1

    c4d7805ad1e88f47d1c03d16103a7f7bec1349f3

  • SHA256

    9c71a5d8c88d358cc47c48dfdea424f5b90a43ed17eeff1a14f768de3ee32ef3

  • SHA512

    b2bff57c21328b9e32f1d95f2360b5431a6a7b40a08bf0736a64eeb591819df0e1410946a9112619c136e85e37567384cf94710d9ac691a3acbde5e61d7aa618

  • SSDEEP

    24576:5nWYXDaHMv6CorjqnyPQGzh0JONZejOuC+e4mOzrvxiI3ENyesg/jHLxQVIxX6Lu:tl1vqjdPQRw/D4mizA0dizLrB51vX

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • AutoIT Executable 3 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 11 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • NTFS ADS 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Program Files\64Âë¸ßÇåÍøÂçµçÊÓv2.4.2.exe
    "C:\Program Files\64Âë¸ßÇåÍøÂçµçÊÓv2.4.2.exe"
    1⤵
    • Executes dropped EXE
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:804
  • C:\Users\Admin\AppData\Local\Temp\2024-01-06_ae81bc18ce346f3f98ec02f9f2b330f1_backswap_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-06_ae81bc18ce346f3f98ec02f9f2b330f1_backswap_icedid.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • NTFS ADS
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:944
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 C:\WINDOWS\Media\ActiveX.ocx /s
      2⤵
        PID:2680

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\64Âë¸ßÇåÍøÂçµçÊÓv2.4.2.exe

      Filesize

      93KB

      MD5

      7139f7c94d6f13155e9088dc9a9a01fd

      SHA1

      bec54c2a2f185d6c8d1289ab608fc05abdd1a224

      SHA256

      8b2fa1341dc9f705ed2daa939f98aa7e70b020a5bd674880af48f417ac8906b2

      SHA512

      e5165887a17824f52f2c1968c96194dc201435a2a247c2b057101845ec88572ddaf27615aa4a2a3065c4737f7bfecde6bfe63a8643e5ec3ef2cd6793cc0b44f8

    • C:\Program Files\64Âë¸ßÇåÍøÂçµçÊÓv2.4.2.exe

      Filesize

      382KB

      MD5

      7cc2dae1e0b947ad5f3deae0a0fd7818

      SHA1

      cd304fc9811c33a057c69c2d6b3f8461b7a73ecc

      SHA256

      4627a3af8f8baf5058bfeb58505d756db72185d266755c1ff521c6e6ba6db949

      SHA512

      e3e6f4e0816912f95750b6a78ccf3251d7262edbdb52efa12ab6dde0443dc93ae7e6fc6193e5933e728c6c7a676cc2b9642ad765e241d0b86a98812ecfb7c0fa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      981c33e30899e653d316560474c440da

      SHA1

      c44c83fcfc1dfc720ef4ba7ccc6651089c65bcd2

      SHA256

      08996814d123098c9e16fbba6ee6760f267c9b94f181a6d17100aa3fba97e8b5

      SHA512

      f1679b54e812cc9536970acd0620722419302841ba2f0974d327f699c8ed7949f1d7838eb552584dbb5ef58be787b7f4b25590f895e18ff8b4000ec9d8f5b6d4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      242B

      MD5

      bc395f7ec0d8a1f1e68319520b1d79b6

      SHA1

      cc8441c8d725066d457cc4253c1a43317ab38440

      SHA256

      c0462a2ded986ec97efb63c383f1672422983d2ad61af04e0c78525f4d85a8b7

      SHA512

      7badf8ce9f0908df5fc4b244d4e548e5bf4bd816945234d028efdc414a2444c322c0e7e5e660903f45dc6cd4824a37eb0f1d841bb3e89b7545ae957ff1144c14

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\1K1DJGNG\live.64ma[1].xml

      Filesize

      3KB

      MD5

      ffda861b67c4fae80f24a2f9957b8f09

      SHA1

      54986873fd4102384fe62e6366c2623783c47e63

      SHA256

      a764cade9696b72cdbec3b40819b2e2f624f41218f5bf374ec277239fd994e53

      SHA512

      280a54ecf5f2758097c369a952ddbaad3a7f84b5c9fbe62835decd690aeb6043bfdbf2f460ac9400c022878d683af09378fbc709e039cf8c66e588d7f97156bc

    • C:\Users\Admin\AppData\Local\Temp\Tar31BF.tmp

      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • C:\WINDOWS\Media\ActiveX.ocx

      Filesize

      12B

      MD5

      7e632764879f2cfb7ef019bc75a1c7e1

      SHA1

      c1871d156d96d6145e3bea7ef1ca740c53a5c803

      SHA256

      285453be49d595873486e56d3ea4ebd6a6af34b5b57946fccbfe21a3a8ed0ead

      SHA512

      0a78e757d6850a075e5279e22fbed2d7169af3448901e5e4e85af3b681e5b29171033cdb346a6326586edb542c237108b925c628fa87fcc27ce0c415eca283c7

    • \Program Files\64Âë¸ßÇåÍøÂçµçÊÓv2.4.2.exe

      Filesize

      384KB

      MD5

      70409f992136ef21a0e2d9394cf2dd21

      SHA1

      6e03e3eac1f0727058ed87d9741640750bd18152

      SHA256

      eed6789f0e8eaa8277fb5f98be24cabe782b7695597bb8d1fb9aa17d40b27b10

      SHA512

      91ec1a2cb885d57850cb09bb2f856d342dca35a9e87a1c3dbdbbfd8c2cc548c80c5b5b3973a5b507e498aadfeb1adda5e32ee051b0c0a923b1f2f9dff724ed41