Analysis
-
max time kernel
14s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 13:37
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-29_d3f8759905644ce25ca2a96f6976daa6_icedid.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-08-29_d3f8759905644ce25ca2a96f6976daa6_icedid.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-29_d3f8759905644ce25ca2a96f6976daa6_icedid.exe
-
Size
4.2MB
-
MD5
d3f8759905644ce25ca2a96f6976daa6
-
SHA1
73e0f34498a9913b79b35d23f111c67c7f47a71e
-
SHA256
58a967e76d0cc6b92a972907f0a3356e0ef53d7bde3465e5850ee3c5547519c1
-
SHA512
94bc88de5ff3ab367d9d0d9aa3a0837535ba746b69199372edef2cd798e316c186e42a925531e37dff8a570316aa316a1b7cb72803b7994d8bb50ea4e12a7e7f
-
SSDEEP
98304:DgFiw73ha3pCDsgG0QjPclQuBVop0ZbbrVPiotn:G7ggDu0mElQEip4hPiotn
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2720 regsvr32.exe 2240 2024-08-29_d3f8759905644ce25ca2a96f6976daa6_icedid.exe -
resource yara_rule behavioral1/files/0x0010000000014132-13.dat upx behavioral1/memory/2720-15-0x0000000073E20000-0x000000007417E000-memory.dmp upx behavioral1/memory/2720-16-0x0000000073E20000-0x000000007417E000-memory.dmp upx behavioral1/memory/2240-18-0x0000000074230000-0x000000007458E000-memory.dmp upx behavioral1/memory/2240-19-0x0000000074230000-0x000000007458E000-memory.dmp upx behavioral1/memory/2240-21-0x0000000074230000-0x000000007458E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-29_d3f8759905644ce25ca2a96f6976daa6_icedid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 46 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\REGCOM.Register.Api.1\CLSID\ = "{9CF66319-AA2F-424A-BEEA-9E42E36BEA1A}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D7111ECF-2415-46C6-AAD4-EE6802448456}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A5CF4797-7A19-403B-908C-E9F1CE93135E} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A5CF4797-7A19-403B-908C-E9F1CE93135E}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\REGCOM.Register.Api\ = "ZCBApiPlug Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9CF66319-AA2F-424A-BEEA-9E42E36BEA1A}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9CF66319-AA2F-424A-BEEA-9E42E36BEA1A}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\blpj.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9CF66319-AA2F-424A-BEEA-9E42E36BEA1A}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D7111ECF-2415-46C6-AAD4-EE6802448456}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A5CF4797-7A19-403B-908C-E9F1CE93135E}\ = "IZCBApiPlug" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\REGCOM.Register.Api.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\REGCOM.Register.Api\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9CF66319-AA2F-424A-BEEA-9E42E36BEA1A}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9CF66319-AA2F-424A-BEEA-9E42E36BEA1A}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{A5CF4797-7A19-403B-908C-E9F1CE93135E}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{A5CF4797-7A19-403B-908C-E9F1CE93135E}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\REGCOM.Register.Api.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\REGCOM.Register.Api regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9CF66319-AA2F-424A-BEEA-9E42E36BEA1A}\ = "ZCBApiPlug Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D7111ECF-2415-46C6-AAD4-EE6802448456}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D7111ECF-2415-46C6-AAD4-EE6802448456}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\blpj.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D7111ECF-2415-46C6-AAD4-EE6802448456}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{A5CF4797-7A19-403B-908C-E9F1CE93135E}\ = "IZCBApiPlug" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A5CF4797-7A19-403B-908C-E9F1CE93135E}\TypeLib\ = "{D7111ECF-2415-46C6-AAD4-EE6802448456}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9CF66319-AA2F-424A-BEEA-9E42E36BEA1A}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9CF66319-AA2F-424A-BEEA-9E42E36BEA1A}\VersionIndependentProgID\ = "REGCOM.Register.Api" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D7111ECF-2415-46C6-AAD4-EE6802448456}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{A5CF4797-7A19-403B-908C-E9F1CE93135E} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\REGCOM.Register.Api\CurVer\ = "REGCOM.Register.Api.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9CF66319-AA2F-424A-BEEA-9E42E36BEA1A} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9CF66319-AA2F-424A-BEEA-9E42E36BEA1A}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9CF66319-AA2F-424A-BEEA-9E42E36BEA1A}\TypeLib\ = "{D7111ECF-2415-46C6-AAD4-EE6802448456}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9CF66319-AA2F-424A-BEEA-9E42E36BEA1A}\Version regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9CF66319-AA2F-424A-BEEA-9E42E36BEA1A}\Version\ = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D7111ECF-2415-46C6-AAD4-EE6802448456}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A5CF4797-7A19-403B-908C-E9F1CE93135E}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9CF66319-AA2F-424A-BEEA-9E42E36BEA1A}\ProgID\ = "REGCOM.Register.Api.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D7111ECF-2415-46C6-AAD4-EE6802448456} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D7111ECF-2415-46C6-AAD4-EE6802448456}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{A5CF4797-7A19-403B-908C-E9F1CE93135E}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A5CF4797-7A19-403B-908C-E9F1CE93135E}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\REGCOM.Register.Api.1\ = "ZCBApiPlug Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D7111ECF-2415-46C6-AAD4-EE6802448456}\1.0\ = "ZCB_APILib" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{A5CF4797-7A19-403B-908C-E9F1CE93135E}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{A5CF4797-7A19-403B-908C-E9F1CE93135E}\TypeLib\ = "{D7111ECF-2415-46C6-AAD4-EE6802448456}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A5CF4797-7A19-403B-908C-E9F1CE93135E}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2240 2024-08-29_d3f8759905644ce25ca2a96f6976daa6_icedid.exe 2240 2024-08-29_d3f8759905644ce25ca2a96f6976daa6_icedid.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2240 2024-08-29_d3f8759905644ce25ca2a96f6976daa6_icedid.exe Token: SeDebugPrivilege 2240 2024-08-29_d3f8759905644ce25ca2a96f6976daa6_icedid.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2240 2024-08-29_d3f8759905644ce25ca2a96f6976daa6_icedid.exe 2240 2024-08-29_d3f8759905644ce25ca2a96f6976daa6_icedid.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2720 2240 2024-08-29_d3f8759905644ce25ca2a96f6976daa6_icedid.exe 29 PID 2240 wrote to memory of 2720 2240 2024-08-29_d3f8759905644ce25ca2a96f6976daa6_icedid.exe 29 PID 2240 wrote to memory of 2720 2240 2024-08-29_d3f8759905644ce25ca2a96f6976daa6_icedid.exe 29 PID 2240 wrote to memory of 2720 2240 2024-08-29_d3f8759905644ce25ca2a96f6976daa6_icedid.exe 29 PID 2240 wrote to memory of 2720 2240 2024-08-29_d3f8759905644ce25ca2a96f6976daa6_icedid.exe 29 PID 2240 wrote to memory of 2720 2240 2024-08-29_d3f8759905644ce25ca2a96f6976daa6_icedid.exe 29 PID 2240 wrote to memory of 2720 2240 2024-08-29_d3f8759905644ce25ca2a96f6976daa6_icedid.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-29_d3f8759905644ce25ca2a96f6976daa6_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-29_d3f8759905644ce25ca2a96f6976daa6_icedid.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 "C:\Users\Admin\AppData\Local\Temp\blpj.dll" /s2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.3MB
MD567415da0dfb59fbdf92f4d289304afee
SHA16c3fc19d3c82e524cd0084363c40a677b00ff5ac
SHA256f33368f0064861ccfae2c92fbbe0732c9b67e17e0cc66c02ac5c5baeca9a000c
SHA5124a659801bb31b59263ed4371b9b07f7292a5310953f50df9518823bbae6526a78f406a57a4172d8cde2a122dc693531505c0870fde160e2ebe3a1eaf2e8f6e3a