Analysis
-
max time kernel
148s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/11/2024, 05:25
Behavioral task
behavioral1
Sample
2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe
Resource
win7-20240903-en
General
-
Target
2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe
-
Size
2.3MB
-
MD5
796a64f3468d20acdecb486bbafb9d54
-
SHA1
147946b22255931da9cba6bce6cedc50c76cc5e1
-
SHA256
bb846882b3def0776589b707f28a52dabacc9f7745c4943d912f33e957b32f61
-
SHA512
0dc326f3e561dd7a0b7c1c1f77d873644075dab260747d7b0b5efa52c3d47fba282ea65cee07b98286a1747b04645e05205bb586acb5281e2c0fa64327914a9d
-
SSDEEP
49152:XCkCFdSRfMMMMM2MMMMMARfMMMMM2MMMMMvnBEf2CkCFdSRfMMMMM2MMMMMARfMu:ykCuRfMMMMM2MMMMMARfMMMMM2MMMMMF
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral1/files/0x000100000001070c-156.dat family_blackmoon -
Executes dropped EXE 1 IoCs
pid Process 3064 mail.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\I: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\K: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\P: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\Q: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\T: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\Z: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\W: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\A: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\E: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\J: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\M: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\O: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\S: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\V: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\Y: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\H: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\L: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\N: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\U: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\B: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\R: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened (read-only) \??\X: 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\certutil.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\control.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\dxdiag.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\gpscript.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\wbem\WMIADAP.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\system32\perfc011.dat OUTLOOK.EXE File created C:\Windows\SysWOW64\svchost.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\IME\shared\IMEPADSV.EXE 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\system32\perfh010.dat OUTLOOK.EXE File created C:\Windows\SysWOW64\bthudtask.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\net.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\raserver.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\SyncHost.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\userinit.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\Dism\DismHost.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\auditpol.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\mobsync.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\powercfg.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\rasautou.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\xpsrchvw.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\regedit.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\esentutl.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\icardagt.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\com\MigRegDB.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\icsunattend.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\mshta.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\RegisterIEPKEYs.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\SystemPropertiesProtection.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\InstallShield\_isdel.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\Dism.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\fixmapi.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\ocsetup.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\poqexec.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\IME\IMEJP10\IMJPDCT.EXE 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\hh.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\prevhost.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\print.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\TpmInit.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\system32\perfh00C.dat OUTLOOK.EXE File created C:\Windows\SysWOW64\cipher.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\msra.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\rrinstaller.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\wimserv.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\winver.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\xwizard.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\fontview.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\Utilman.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\wecutil.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\system32\perfh009.dat OUTLOOK.EXE File created C:\Windows\SysWOW64\ARP.EXE 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\ftp.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\netbtugc.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\SearchProtocolHost.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\WPDShextAutoplay.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\autoconv.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\cmstp.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\dvdplay.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\findstr.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\msiexec.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\sdchange.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\secinit.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\hdwwiz.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\ntprint.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\SysWOW64\UserAccountControlSettings.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Internet Explorer\iexplore.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Program Files\DVD Maker\DVDMaker.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Program Files\Internet Explorer\ielowutil.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Program Files\Windows Mail\wab.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Program Files\Windows Media Player\wmpnscfg.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CNFNOT32.EXE 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Java\jre7\bin\ktab.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Java\jre7\bin\servertool.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Program Files\Windows Defender\MpCmdRun.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Oarpmany.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ConvertInkStore.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Program Files\Windows Mail\WinMail.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\INFOPATH.EXE 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORDB.EXE 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Program Files\Windows Media Player\wmpenc.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Setup.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Program Files (x86)\Windows Media Player\WMPDMC.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\mip.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Program Files (x86)\Windows Sidebar\sidebar.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\7-Zip\7z.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Java\jre7\bin\policytool.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Program Files\Windows Media Player\WMPDMC.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Program Files\Windows Media Player\wmpshare.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Program Files\Internet Explorer\ieinstal.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Java\jre7\bin\java.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\bckgzm.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCICONS.EXE 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DWTRIG20.EXE 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Program Files (x86)\Windows Mail\wab.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Java\jre7\bin\javacpl.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Games\Chess\Chess.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Program Files (x86)\Windows Media Player\wmpenc.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Java\jre7\bin\tnameserv.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Program Files\Windows Defender\MSASCui.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\VPREVIEW.EXE 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVEMN.EXE 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Java\jre7\bin\rmid.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\FLTLDR.EXE 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Program Files (x86)\Internet Explorer\ielowutil.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\MineSweeper.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Program Files (x86)\Windows Media Player\wmpconfig.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORE.EXE 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Java\jre7\bin\klist.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Java\jre7\bin\ssvagent.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\shvlzm.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Program Files\Windows Journal\PDIALOG.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WORDICON.EXE 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\InkWatson.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\Hearts.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Program Files\Windows Media Player\wmpnetwk.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\twunk_16.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\ehome\RegisterMCEApp.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\SC_Reader.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\winsxs\Backup\wow64_microsoft-windows-dns-client_31bf3856ad364e35_6.1.7601.17514_none_4a5d2c9ecd59afa7_dnscacheugc.exe_aa32623e 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File opened for modification C:\WINDOWS\IE2.EXE 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\winsxs\Backup\amd64_microsoft-windows-security-spp_31bf3856ad364e35_6.1.7601.17514_none_78875ce737927d27_sppsvc.exe_fc6922a9 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\winsxs\Backup\amd64_microsoft-windows-t..localsessionmanager_31bf3856ad364e35_6.1.7601.17514_none_036ad230212a39ce_lsm.exe_ecbd567a 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\HelpPane.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\ehome\wow\ehexthost32.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\winsxs\Backup\amd64_microsoft-windows-rasautodial_31bf3856ad364e35_6.1.7600.16385_none_6bcef05d7f04260a_rasautou.exe_477abe34 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\winsxs\Backup\amd64_microsoft-windows-winlogon_31bf3856ad364e35_6.1.7601.17514_none_cde90685eb910636_winlogon.exe_ac37d0c5 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\winsxs\Backup\wow64_microsoft-windows-coreusermodepnp_31bf3856ad364e35_6.1.7601.17514_none_df7c5af777ec4541_drvinst.exe_6593e92a 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\hh.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\ehome\McrMgr.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\winsxs\Backup\amd64_microsoft-windows-d..pwindowmanager-core_31bf3856ad364e35_6.1.7601.17514_none_ebc99983d3d18578_dwm.exe_04cf416e 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\winsxs\Backup\amd64_microsoft-windows-newdev_31bf3856ad364e35_6.1.7600.16385_none_6d6b3cfb6a5a1e5a_ndadmin.exe_8e57269f 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\winsxs\Backup\amd64_microsoft-windows-p..installerandprintui_31bf3856ad364e35_6.1.7601.17514_none_347a450f0c8bd52d_printui.exe_bb673fff 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\winsxs\Backup\wow64_microsoft-windows-a..ence-infrastructure_31bf3856ad364e35_6.1.7601.17514_none_3d8bb37f97ba22ff_sdbinst.exe_8725e339 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\winsxs\Backup\amd64_microsoft-windows-errorreportingcore_31bf3856ad364e35_6.1.7600.16385_none_7c6ba3bd1f954290_wermgr.exe_d92a3b6c 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\winsxs\Backup\wow64_microsoft-windows-p..unterinfrastructure_31bf3856ad364e35_6.1.7601.17514_none_da00ad1949e715ad_unlodctr.exe_69df45bb 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\winhlp32.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\servicing\GC64\tzupd.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\winsxs\Backup\amd64_microsoft-windows-b..vironment-os-loader_31bf3856ad364e35_6.1.7601.17514_none_b94cbfa183466a89_winresume.exe_85cd1215 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\winsxs\Backup\amd64_microsoft-windows-virtualdiskservice_31bf3856ad364e35_6.1.7601.17514_none_c910d80f114e267a_vds.exe_cb461c29 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\winsxs\Backup\amd64_microsoft-windows-winlogon-tools_31bf3856ad364e35_6.1.7600.16385_none_f0686b7ca6acde00_mpnotify.exe_bd6992f8 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\explorer.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\splwow64.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\ehome\MediaCenterWebLauncher.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\winsxs\Backup\wow64_microsoft-windows-wmi-core-svc_31bf3856ad364e35_6.1.7601.17514_none_092d6b9141f16aca_winmgmt.exe_8f8eb7b1 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\winsxs\Backup\x86_microsoft-windows-newdev_31bf3856ad364e35_6.1.7600.16385_none_114ca177b1fcad24_newdev.exe_7eb73dcd 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\winsxs\Backup\x86_microsoft-windows-errorreportingcore_31bf3856ad364e35_6.1.7601.17514_none_227e1c01642654f4_wermgr.exe_d92a3b6c 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\WINDOWS\IE2.EXE 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\winsxs\Backup\amd64_microsoft-windows-appid_31bf3856ad364e35_6.1.7601.17514_none_b57215bac8c6d647_appidcertstorecheck.exe_03352f5f 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\winsxs\Backup\amd64_microsoft-windows-csrss_31bf3856ad364e35_6.1.7600.16385_none_b4d8d57efdc6b4f3_csrss.exe_06529458 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\winsxs\Backup\amd64_microsoft-windows-appid_31bf3856ad364e35_6.1.7601.17514_none_b57215bac8c6d647_appidpolicyconverter.exe_83972af0 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\winsxs\Backup\amd64_microsoft-windows-winlogon-tools_31bf3856ad364e35_6.1.7600.16385_none_f0686b7ca6acde00_wlrmdr.exe_f8ebac58 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\winsxs\Backup\amd64_microsoft-windows-lua_31bf3856ad364e35_6.1.7601.17514_none_047062a1736af5b9_consent.exe_9075a1c2 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\Installer\{90140000-0011-0000-0000-0000000FF1CE}\misc.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\winsxs\Backup\amd64_microsoft-windows-p..unterinfrastructure_31bf3856ad364e35_6.1.7600.16385_none_cd7aeeff1897d018_lodctr.exe_b02cefba 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\winsxs\Backup\amd64_microsoft-windows-smss_31bf3856ad364e35_6.1.7600.16385_none_082f99a432e2a661_smss.exe_d7209c3a 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\winsxs\Backup\wow64_microsoft-windows-p..installerandprintui_31bf3856ad364e35_6.1.7601.17514_none_3eceef6140ec9728_printui.exe_bb673fff 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\winsxs\Backup\x86_microsoft-windows-basic-misc-tools_31bf3856ad364e35_6.1.7600.16385_none_17330d9420bf24e8_expand.exe_f43b24c8 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\write.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\ehome\ehrec.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\Installer\{90140000-0011-0000-0000-0000000FF1CE}\joticon.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\winsxs\Backup\amd64_microsoft-windows-session0viewer_31bf3856ad364e35_6.1.7600.16385_none_3ddbd9a9605f0519_ui0detect.exe_639495e3 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\winsxs\Backup\amd64_microsoft-windows-setupapi_31bf3856ad364e35_6.1.7601.17514_none_931b5f1fdcdd6496_wowreg32.exe_94fc2d06 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\twunk_32.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\winsxs\Backup\amd64_microsoft-windows-b..environment-windows_31bf3856ad364e35_6.1.7601.17514_none_c75e9c99a36a285a_winload.exe_75835076 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\winsxs\Backup\amd64_microsoft-windows-international-core_31bf3856ad364e35_6.1.7600.16385_none_459f562ff37206dd_muiunattend.exe_1e11bb40 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\winsxs\Backup\wow64_microsoft-windows-netbt_31bf3856ad364e35_6.1.7601.17514_none_c8df7823424473a1_netbtugc.exe_825f4f74 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\winsxs\Backup\wow64_microsoft-windows-htmlhelp_31bf3856ad364e35_6.1.7600.16385_none_2e9f92abd2ce43b6_hh.exe_f87e0044 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\winsxs\Backup\x86_microsoft-windows-legacyhwui_31bf3856ad364e35_6.1.7600.16385_none_e24a7886a9947ebf_hdwwiz.exe_b6a1c2df 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\winsxs\Backup\amd64_microsoft-windows-lsa_31bf3856ad364e35_6.1.7601.17514_none_04709031736ac277_lsass.exe_682060de 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\winsxs\Backup\x86_microsoft-windows-msauditevtlog_31bf3856ad364e35_6.1.7600.16385_none_c718d071d9c10a2d_auditpol.exe_83c870f4 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\ehome\ehmsas.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\ehome\loadmxf.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\ehome\mcspad.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\Installer\{90140000-0011-0000-0000-0000000FF1CE}\oisicon.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\Installer\{90140000-0011-0000-0000-0000000FF1CE}\outicon.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\Speech\Common\sapisvr.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\ehome\ehexthost.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\Installer\{90140000-0011-0000-0000-0000000FF1CE}\pubs.exe 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe File created C:\Windows\winsxs\Backup\x86_microsoft-windows-os-kernel_31bf3856ad364e35_6.1.7601.17727_none_6e30004a126a8db7_ntoskrnl.exe_0fb0ab79 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mail.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OUTLOOK.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000677562fc4c9f492e8d828bd8d0be12b155e8a1e3d55b176cbd7651dda94f4cdc000000000e8000000002000020000000eddd113f616ddfe2f58c223171dd3889fe1f2dd56ace4fb2a9521e7803ede78720000000a46b60c0e7609a5b32c7c2ab62c5204c35d473e6a92cd1889d605dc94627123f40000000e2e16959e21bf65652d35c888de88451853b7d916abb7a1492356881c59032399b7c8c46e6afb47ac08ce88106c566b6215d3e4d8bae3ff97d3131e9596ebdf9 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40a434d9c33fdb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000e508f12a7adb745a943ced36728e28c2b84d1d5000de1d725b75267b01b0dedb000000000e8000000002000020000000bf0f8f6c47c59d0349d2683d22534eda6387576c7be509152bd72b23daca1df39000000094435e257d5d996d515718bdc75781f2a2c1bf915b84b951941f53396f5e318997b98afc31888557d746de3da190b7ce635558b5474e7cc8b17cb121ec99166cbcc65d7986d994ab02d9aea6c98da7b019e7b726ac6a2301d0f3e4b12bab90526328042a205b6649b5cf164cfedc03704eae0cee2babc3c9387b14fadee3f449aa42669f58bd34b88e0e3a78e09638af400000003eded62e38bf5124e5f2525b6237f0cbc2b189eb806a081b549dc6633cf3bc62d867ae165a4571d04294c3e2ab90c3e17a1939945c7ec2dfac2975db42748e97 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "438760623" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E9C3BEE1-ABB6-11EF-A7A5-465533733A50} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630E6-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630E8-0000-0000-C000-000000000046}\ = "_NavigationModule" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063105-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630F7-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063020-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063009-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630FF-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063086-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006303E-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630DD-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006302A-0000-0000-C000-000000000046}\ = "InspectorEvents_10" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063073-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063036-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006304A-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063006-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063080-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063077-0000-0000-C000-000000000046}\ = "ItemsEvents" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063097-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063038-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006304A-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063006-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006307B-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006307A-0000-0000-C000-000000000046}\ = "OutlookBarPaneEvents" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672E3-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630CE-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063077-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006307B-0000-0000-C000-000000000046}\ = "OutlookBarGroupsEvents" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063007-0000-0000-C000-000000000046}\ = "Attachment" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063046-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063005-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630C7-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630CD-0000-0000-C000-000000000046}\ = "_Rule" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630DE-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063105-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006302A-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672EE-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630A0-0000-0000-C000-000000000046}\ = "_ViewField" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006304C-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063046-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063105-0000-0000-C000-000000000046}\ = "AccountsEvents" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672F4-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672E5-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672F7-0000-0000-C000-000000000046}\ = "OlkInfoBarEvents" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630D7-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630DF-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063048-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006307C-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630A0-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{50BB9B50-811D-11CE-B565-00AA00608FAA}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630F2-0000-0000-C000-000000000046}\ = "_NavigationFolder" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630E5-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00067367-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006304D-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063079-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063072-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006307C-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063025-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063087-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630FE-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630EF-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630F8-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006308D-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00067352-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063043-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2652 OUTLOOK.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2652 OUTLOOK.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 33 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: 33 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe Token: SeIncBasePriorityPrivilege 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1616 iexplore.exe 2652 OUTLOOK.EXE 2652 OUTLOOK.EXE 2652 OUTLOOK.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2652 OUTLOOK.EXE 2652 OUTLOOK.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe 1616 iexplore.exe 1616 iexplore.exe 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2652 OUTLOOK.EXE 2652 OUTLOOK.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2160 wrote to memory of 3064 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe 30 PID 2160 wrote to memory of 3064 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe 30 PID 2160 wrote to memory of 3064 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe 30 PID 2160 wrote to memory of 3064 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe 30 PID 2160 wrote to memory of 1616 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe 31 PID 2160 wrote to memory of 1616 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe 31 PID 2160 wrote to memory of 1616 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe 31 PID 2160 wrote to memory of 1616 2160 2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe 31 PID 1616 wrote to memory of 2824 1616 iexplore.exe 32 PID 1616 wrote to memory of 2824 1616 iexplore.exe 32 PID 1616 wrote to memory of 2824 1616 iexplore.exe 32 PID 1616 wrote to memory of 2824 1616 iexplore.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-26_796a64f3468d20acdecb486bbafb9d54_hijackloader_icedid_luca-stealer.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\mail.exe"C:\mail.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3064
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.dywt.com.cn/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1616 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2824
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE"C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" -Embedding1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2652
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.3MB
MD5a868384481906a64d6af1d97d5970d25
SHA12edd39a7c733d0591c53985898daa71315a68d0a
SHA2568af7e2335126e24bb9c040f8a96ccc6a330639128ec7f99c6865adfa7395f2e8
SHA512b47e56fb5e90888c92743f9845141670243ed6ceab745cec0ba3d77b8b32d1d5f5cc1b24fc1b060783e85e267fe4f0b8488461c268f002c11b3411f06d3bfb84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfdb83703300c8bbf0844d64e28d395d
SHA1ff3aebd2726294f2f807e1b58116a044418883dc
SHA256c45fe85e20e7c63139ba0372cb9e932f8659a3f3ec41c3886e8ecf86c2c47b81
SHA512c04d30d70ac27b55f78af619d4e2074a42463a4eb6c0c1b1555612eec7096ee25668893d4cf3ef28c3ee49634fa4861bd5ad58ccc1bb9d69fcdf6473788a0f50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5937ea532f90d9c0c06ddb2ac68149ce6
SHA18d90a2c1399b12a89858373f99c70cc086021882
SHA25661ec4f16f3e5f4d2a7a37b8d6da61c712b9278e14722773ae54d57bba52b43d1
SHA5120b1394cb7d3591ef24ccefae11fc783804ebff1b916bb9d09016ce21c362a2c6d74425edf706315b159f6ccfb32ec811afe4b38bf7344952856669141486e0e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efec624cf0c6a963947a6f19f49bb30c
SHA17421d919d6704e10d9900c3dec0ffedfec6a906c
SHA256d2a1fd1a4e1fd6f31338f8ac45db1da8fde5ebdd6e975668d18dc0a0495bee4b
SHA51200b7631596a7505309e7762ab233be6fe2bd34051345bacc5bb15193137fc9c1f823d4c8f8782144e253e23d4a4f302ab49cb6ae79a9a47001540aed6031212b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c127bed18ac625234fca73d5f4c83e51
SHA12668b63ebb68e0191843f4f6a9994a1796243f1e
SHA2562e936b8a8aecaa369a3568bc973e196ce764beb857d72265d9992de6e8347c61
SHA5129cdc1d14afd133c344ab3dc74d5231d54e2a7ec3bed1c6915db27d06bbfd105f9e55664085326a75da8019c1f86d696768cf396c8a1d045a3f802edfc4b94c71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51364bee963de5f194a85119eb78afb2f
SHA163d1ca125f5f5f002e95e78ba608a49cff4e661a
SHA256909b11487e913c4f109a7ac3f2919e642032fbf0a1d8e7653ad5b8c81f6e6e7a
SHA51202a4f08940a4fa5639e827fb59919e9835842977845af70c706b170ee44dbe1c63cd02673e2d3e18bf8c800d9670898bb90f5b47eb70c7470f12615f3135f022
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575aa29b6420b76fbd7fcde95b232ca5e
SHA1a9ed3d826e2c2b3589fba7b07ca23b05d1981162
SHA256e98813e930018433ea4192fd8670ab2571c65c6b5a0b4693649105c59b496021
SHA51252d1e6510a46bf9cfbde1d261e4dfcffbb14aba9de2a7eeb84aa1f53b684caf75d9951fc07a12bd09af75a4cfc5bc30a32b6ff16dd4847c6981676c877bd3a05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5422d851b1f587ca9b2a6168373dfeae3
SHA148b72ee150bf75b796adbb939924d22002feb790
SHA25632afcef9ef10007c74c6566558546d9eb441fcd8611d45868d328c2b84a722bd
SHA512979f2f0012bdead777b78135628dbd1589c2a90494fac3035f4ba8c60a21f1f9aa35569e0fe2aa9e92a0efe9ab81b040cf6baf1cf0f74dfd023d1bfbe8effda9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5371b01a6334c05fa0a5b7b302fb17b1d
SHA1f0f6bff580916f908f4e0f06c3650059f9a8e1e1
SHA256b4ce3338de9b70ee94b7003f44f190607de0885f58fadf0e4684f78aa2f5de8d
SHA512021a24c7c0338b3686ab96bcacceec8a05400a419f144c66b6e06d48710a8bfe72fe96aeb473948952c8b6e6898dc3d10926cfb416beb78108537dbb68ce670f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c94945a0bd62dffc2cde725b1438618a
SHA11c3d1a73b771ff17d3ae4aab83f40108eb70605b
SHA256683ccd59984de8f2aebabb77795f8557f03b37c946f641ea3bccb8f61bb5418c
SHA512ac15a9c91b5d311f192aa098e7fb87f5969ef3c69a7a29a0ff4a1a1c19df8941bde72c903f5c62f7a6f32e68f24bcec0820d9191e552e77eb963b7f54fcf512c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59494a5892fc16f7d46d1445f51fb3d30
SHA11908e5e29713a0eca73cb4405a15f7945a45bd38
SHA256a99925a84826358e0f5bab8bf0f16a2793808afa9d336abde7466ae0a14ab7de
SHA512d26e1b1e89ca4291822fb55bbac18b32b377bcf3d45a970be44506176d6f02614908eb1bfccd5dc8eda4e7830316878ce8bbb5af8c8c5c15e24e989615ad90ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f42e414756d2641cc0011b8614f06f9
SHA1280369f4449d6b222147b099a0a901faca519a76
SHA256b3cb070efc1751639ec8eb43e1c82b0924bc092c4320dc9ea0476275973ebd68
SHA51268038f690d298ba13dd8ca237dc8683ac65cb760b6a948686b2d6fe29669174ad57ad67df0b730594de89bf7135ed817d332125c2b8a38d1cfbfa9779edcaec2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ad798b7f1124d762eaba29e44e684e7
SHA1b556be7e7b304ab0e47bf50e52006149aebc569c
SHA2564f83f9f46082b0258f87609f99303ceebc34a3a4363ebedb30f03da449a7b7ec
SHA512bb874127fd28849066d95cbb8c16b122e5586d2533c881e973ce3da61dc15de7e8a9ac5668b1cfd6fc91d165c68e1c7a1e55800572096b892a77e5436862e9e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c874bda85ae4c81fe5ea6938bda6d146
SHA17d12c0b6081defc2f640a624faa7ad40aafae017
SHA2563d68d6ca762517a41fa8c04de8b6506e4068bee2797c8201472b112b52caaab0
SHA512dc8e24764b88bf8b7646b636f5f3ec8579672678627a64948bb2d93f2bb63117a8ab8a49088979ec7e0ddc95c32545f5646d973c97fe4cb849b797cddd85a115
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8582ffd2d94d7d21e7d903f6c958d28
SHA1c5834dc7d30d1830d46ee45ea6453f02e90c23a3
SHA256e9f528df9a151d7233337c6aca3537b6632552007b7189fcbf8aa1d229cd2b23
SHA51212076af33f17f091e79703787d326adadc1e3e2aa0834bcb2166955e70a18e6086a83081e8027380036a1826d4e82f95b36059a3748fe610ddbffcb73de1569b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584550ca28b2d163119233c66e51424da
SHA11fb128ecc0fdb0a402de3148789a8aee47718579
SHA256301d9bb5988b2ec3cfe4ac6efe32554556a83f38b961e2b3d48b87b0474aaa0a
SHA512efe77f73a7d9c63162a05baf0ba38045d281e18b631f992629b3b8b7cc2a5f1863656f1b283679a576a158c2459ba592418a196732284b4267cb068e3daa8436
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aab468e60eedfb0a324807efe47aee8b
SHA1b8494d7f89e69e46979c37bbe8367cb29f61fc8c
SHA2568ea63bcab6c9f9d32a34b32abeaf52f60fcf7edebffca760383323b470ac277b
SHA512d9c1f9e3fd6e91b1d5b1011e186200075d3e52613f86f8aa1ef7c9a39d5a20a576bd1be451b9a37a4eca7bcc2a22114ef5d686462e36fe13b64ffd12b875181e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb375b98913fb501008b23709e15c21e
SHA1db65fce26c71f493ed1286cdf7b9d97b9048389a
SHA256996f242f056032d8a5cf40f20e975bee1d97c7258a4c297e4e25e74afff4b02a
SHA51233cc3a34679c6a3a072565108f610c2c3468c59af3bb77951d73b18d4163fdaee59a84d0195dde964cf6776156e1aab23ca9ca0f5be6cd51b5313556e42a616a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6121c7a7a1df18b850d0d80bd85d33f
SHA151ae2a238f26fbe05f7cb0a2b277a4901e90b9fc
SHA256f3dc058dee0afb91e11fed76ee08964bfe7682e5dedbcff2c8a5d68fb99823cd
SHA5125ffcd1c959c3d6846696bd2f562416608b8b3ef395967053756349d34078332ebbb2c738703fd1443c495c6a9b2bda27ebe08b906a7459d6acaf126185a1fbae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562abe405dd12382555ccfacc2e477d5b
SHA1bb4ea6b8c48a34462deb4698118995b9bcab6205
SHA25643e1e3da178abbc84ea5b054bb550af2cac6398bfdc88045c68f6b1028fa451c
SHA5123677d033cd567e55b56bd1eda80cc07784bad744f8b3c3bed1ee8daa7325802857a97e0c8b4296c6a9bb7fbe9fc34e56d543d12e199253d50ffd14d312627db7
-
Filesize
238KB
MD5f5524a45db5be96110074ea3de662e39
SHA17195a7b667317ea2e2cb8efb7bb83ecf20f4f3f1
SHA2567d9e7174d654db1472df73e1ce3b0bd1a6a1b52581a6c048914f8d324aafd78c
SHA51255360b7b55cb675830027014c638ceecea6256829ff60585005eda7173f0bb953335420113b53b92e401cfcccc07d04960f9f6abde194ba7d4e1acaec8090447
-
Filesize
240KB
MD5d467e186e9b7a28d35c19c4f36897951
SHA181d5f111c1942cdba870b3371f799280632d997c
SHA256f3f970ab6cd95fa68268aa3d438578e9f362df7dbaff94972402250c411e365a
SHA512ae5863a2375db65e09f633c68a63e0b14b78a44f32987753370fadf950291d07cfde85563bc70d7b01040c19ed669ac9aca01c6df075acf36caa983d2466df18
-
Filesize
230KB
MD5d111bfe0d2e55a0bb3b474c20d9ed622
SHA1cc9dcd511a637c7ef0e9fa3ff4713ff3c48908d2
SHA256191adc349cfc65404f6becd3f73adc741b46692d2ea4436b39fdd2c0b29d3f7f
SHA5127f862dfb73432c6816f6f1403011a28a5261c58c0de5ac7a3a2853cad796eaeaca9bdf9d87a38c8c2cb65005ce21bfa8c05ad78a4bffe6c7f492a9b63431caff
-
Filesize
1KB
MD548dd6cae43ce26b992c35799fcd76898
SHA18e600544df0250da7d634599ce6ee50da11c0355
SHA2567bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a
SHA512c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
4KB
MD538c2fc50e0925d76fdf473f29b725baf
SHA1395b6a1b0be5c37604988936089ab27a805a0247
SHA256100b4c78fd7d3aabec1bf6bbf0e11b1056af369a9507b6f9e6043221b5d56fc4
SHA51253a9f6ae5d8e9d70ef507f2bb2138883f5a2f5386384a9a55c0a509fd250e41e3bbb0a5eb8dbbd53e78c120c565756db0cfbf8531bf0dc4979a83148a5300b97
-
Filesize
63KB
MD5797d36d890bd96ef00369a2f4ee00f07
SHA1ece843e8e93f8d8dcfa69961898043391e6cef69
SHA2566c04ae545e15fe257e1cfe374649ad968a643ceb7e3f75a834825530633c30b6
SHA5126064215d00f7bde0a052b5eacd19eb5dd40021d5dc0ead3a816700cb89fdd668445258367c1c24ab9008a53978e84ea0fc0f675582ed5a957bf31cff41c68bb7
-
Filesize
80KB
MD5acc7b993d6dbb4e6b8f5736ef6d65b9a
SHA1cd0a746e7b9ff049f5aadef367e38bc08d78c5f7
SHA256b83587fdc697a52f8350bce8356183120627a99183879a867cb726645d0b357b
SHA512b6fadd5e6da0062ba7043d1cce1ad6a5a6bfd84db583c9bb3084afe1b90d2951f86c3f4f73e4999208ee778b4991a6295af9e2ca626eab6009e54a020543c7b0