Analysis

  • max time kernel
    120s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    20/05/2024, 10:44

General

  • Target

    2024-05-20_1d9d2e901e69004f8e818ddd5ed6da9d_icedid.exe

  • Size

    3.7MB

  • MD5

    1d9d2e901e69004f8e818ddd5ed6da9d

  • SHA1

    7700e56a7c5fd76b825c6d9b7769d3c34e35e2f6

  • SHA256

    492e55c467a974e2afe24ebbf4d6785c5c22e8e6010d630afd6f687630fb26e4

  • SHA512

    13e4e9720dbf7f2e655a2a46211197d7488f804346f5799ea052814b004d8cf37c8fd35885eecf333e8f2ccf4757e3f7c641a9a2d69de8c508d367b498624cdb

  • SSDEEP

    49152:+F8uJAwa2iMIeESAz9oDhdfaxncTniDJYMqauqHene4syW1ywpdQ3zF9P/tW17nf:qNNWMFTrau9ep1ywfkF9PFUb8Tk

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 24 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-20_1d9d2e901e69004f8e818ddd5ed6da9d_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-20_1d9d2e901e69004f8e818ddd5ed6da9d_icedid.exe"
    1⤵
    • Installs/modifies Browser Helper Object
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1440

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads