Analytics Story: IcedID

Description

Leverage searches that allow you to detect and investigate unusual activities that might relate to the IcedID banking trojan, including looking for file writes associated with its payload, process injection, shellcode execution and data collection.

Why it matters

IcedId banking trojan campaigns targeting banks and other vertical sectors.This malware is known in Microsoft Windows OS targetting browser such as firefox and chrom to steal banking information. It is also known to its unique payload downloaded in C2 where it can be a .png file that hides the core shellcode bot using steganography technique or gzip dat file that contains "license.dat" which is the actual core icedid bot.

Detections

Name ▲▼ Technique ▲▼ Type ▲▼
Account Discovery With Net App Domain Account TTP
Net Localgroup Discovery Local Groups Hunting
Office Application Spawn Regsvr32 process Spearphishing Attachment TTP
Office Application Spawn rundll32 process Spearphishing Attachment TTP
Office Document Executing Macro Code Spearphishing Attachment TTP
Office Product Spawning MSHTA Spearphishing Attachment TTP
Remote System Discovery with Net Remote System Discovery Hunting
Suspicious Process File Path Create or Modify System Process TTP
Any Powershell DownloadString PowerShell, Ingress Tool Transfer TTP
CHCP Command Execution Command and Scripting Interpreter TTP
CMD Carry Out String Command Parameter Windows Command Shell Hunting
Create Remote Thread In Shell Application Process Injection TTP
Detect PsExec With accepteula Flag SMB/Windows Admin Shares TTP
Disable Defender AntiVirus Registry Disable or Modify Tools TTP
Disable Defender BlockAtFirstSeen Feature Disable or Modify Tools TTP
Disable Defender Enhanced Notification Disable or Modify Tools TTP
Disable Defender MpEngine Registry Disable or Modify Tools TTP
Disable Defender Spynet Reporting Disable or Modify Tools TTP
Disable Defender Submit Samples Consent Feature Disable or Modify Tools TTP
Disable Schedule Task Disable or Modify Tools TTP
Disabling Defender Services Disable or Modify Tools TTP
Drop IcedID License dat Malicious File Hunting
Eventvwr UAC Bypass Bypass User Account Control TTP
Executable File Written in Administrative SMB Share SMB/Windows Admin Shares TTP
Executables Or Script Creation In Suspicious Path Masquerading Anomaly
FodHelper UAC Bypass Modify Registry, Bypass User Account Control TTP
IcedID Exfiltrated Archived File Creation Archive via Utility Hunting
Mshta spawning Rundll32 OR Regsvr32 Process Mshta TTP
Network Connection Discovery With Arp System Network Connections Discovery Hunting
Network Share Discovery Via Dir Command Network Share Discovery Hunting
NLTest Domain Trust Discovery Domain Trust Discovery TTP
Powershell Fileless Script Contains Base64 Encoded Content Obfuscated Files or Information, PowerShell TTP
Powershell Processing Stream Of Data PowerShell TTP
Powershell Using memory As Backing Store PowerShell TTP
Process Creating LNK file in Suspicious Location Spearphishing Link TTP
Registry Keys Used For Persistence Registry Run Keys / Startup Folder TTP
Regsvr32 with Known Silent Switch Cmdline Regsvr32 Anomaly
Remote WMI Command Attempt Windows Management Instrumentation TTP
Rundll32 Create Remote Thread To A Process Process Injection TTP
Rundll32 CreateRemoteThread In Browser Process Injection TTP
Rundll32 DNSQuery Rundll32 TTP
Rundll32 Process Creating Exe Dll Files Rundll32 TTP
RunDLL Loading DLL By Ordinal Rundll32 TTP
Schedule Task with Rundll32 Command Trigger Scheduled Task/Job TTP
Sqlite Module In Temp Folder Data from Local System TTP
Suspicious Copy on System32 Rename System Utilities TTP
Suspicious IcedID Rundll32 Cmdline Rundll32 TTP
Suspicious Regsvr32 Register Suspicious Path Regsvr32 TTP
Suspicious Rundll32 dllregisterserver Rundll32 TTP
Suspicious Rundll32 PluginInit Rundll32 TTP
Windows AdFind Exe Remote System Discovery TTP
Windows Curl Download to Suspicious Path Ingress Tool Transfer TTP
Windows Group Discovery Via Net Local Groups, Domain Groups Hunting
Windows ISO LNK File Creation Malicious Link, Spearphishing Attachment Hunting
Windows Office Product Loading VBE7 DLL Spearphishing Attachment Anomaly
Windows Office Product Spawned Uncommon Process Spearphishing Attachment TTP
Windows Phishing Recent ISO Exec Registry Spearphishing Attachment Hunting
Windows Sensitive Group Discovery With Net Domain Groups Anomaly
Windows Suspicious Process File Path Create or Modify System Process, Match Legitimate Name or Location TTP
Windows WMI Process Call Create Windows Management Instrumentation Hunting
WinEvent Scheduled Task Created Within Public Path Scheduled Task TTP
WinEvent Windows Task Scheduler Event Action Started Scheduled Task Hunting
Wmic NonInteractive App Uninstallation Disable or Modify Tools Hunting

Data Sources

Name ▲▼ Platform ▲▼ Sourcetype ▲▼ Source ▲▼
CrowdStrike ProcessRollup2 N/A crowdstrike:events:sensor crowdstrike
Powershell Script Block Logging 4104 Windows icon Windows xmlwineventlog XmlWinEventLog:Microsoft-Windows-PowerShell/Operational
Sysmon EventID 1 Windows icon Windows xmlwineventlog XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
Sysmon EventID 11 Windows icon Windows xmlwineventlog XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
Sysmon EventID 12 Windows icon Windows xmlwineventlog XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
Sysmon EventID 13 Windows icon Windows xmlwineventlog XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
Sysmon EventID 22 Windows icon Windows xmlwineventlog XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
Sysmon EventID 7 Windows icon Windows xmlwineventlog XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
Sysmon EventID 8 Windows icon Windows xmlwineventlog XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
Windows Event Log Security 4688 Windows icon Windows xmlwineventlog XmlWinEventLog:Security
Windows Event Log Security 4698 Windows icon Windows xmlwineventlog XmlWinEventLog:Security
Windows Event Log Security 5140 Windows icon Windows xmlwineventlog XmlWinEventLog:Security
Windows Event Log Security 5145 Windows icon Windows xmlwineventlog XmlWinEventLog:Security
Windows Event Log TaskScheduler 200 Windows icon Windows wineventlog WinEventLog:Microsoft-Windows-TaskScheduler/Operational

References


Source: GitHub | Version: 1