Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24/06/2024, 01:38

General

  • Target

    2024-06-24_f8afd2edd536bf7e11a469ef4832713f_icedid.exe

  • Size

    3.7MB

  • MD5

    f8afd2edd536bf7e11a469ef4832713f

  • SHA1

    2e14c2ec2d1b9935efd0759ce43b38bf38c4a092

  • SHA256

    253fc19a758662b46566ee43761edd4524b740119ac7b59fbb7c2ef6434e461f

  • SHA512

    514d508953b6ab9d69666ac4023af58a1397dacb745daeba8d3161493c9776249a73df1824ce9f32ab682a3ed61c3dbd1e6409447efaf0644531f360b032e517

  • SSDEEP

    49152:fRmTgwMQo7af2fH43yCzEwly31ywbQ4146caTtPhF+P17n8Tfm:fRGglQAH4vzvQ1yw8z6bTtPz+Nb8TO

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 24 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-24_f8afd2edd536bf7e11a469ef4832713f_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-24_f8afd2edd536bf7e11a469ef4832713f_icedid.exe"
    1⤵
    • Installs/modifies Browser Helper Object
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads