heroui logo

IcedID Exfiltrated Archived File Creation

Splunk Security Content

View Source
Summary
This analytic rule detects the creation of suspicious archived files named 'passff.tar' and 'cookie.tar', which indicate the presence of IcedID malware on a compromised machine. These files are often a sign of exfiltrated browser data, such as user history and cookies, suggesting that sensitive personal information has been stolen. The detection uses Sysmon EventCode 11 to track the creation of these files, aiming to identify potential data breaches and the exfiltration of personal data. The analytics highlight the importance of recognizing these artifacts, as they are associated with further exploitation possibilities, including phishing attacks and increased threat actor presence. The rule requires integration with Sysmon logs and is intended for proactive threat hunting within endpoint environments.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Process
  • File
ATT&CK Techniques
  • T1560.001
  • T1560
Created: 2024-11-13