Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-08-2023 12:48

General

  • Target

    6eeb83661e6060bf9200e20ea621dc75_icedid_JC.exe

  • Size

    404KB

  • MD5

    6eeb83661e6060bf9200e20ea621dc75

  • SHA1

    1fa0f0720a4536e6f04fdb2548572be1296debfe

  • SHA256

    e02da76ad0321eea69cd3466dc70f3fc936f9c6c980a459e78e2c8a04d38ba7e

  • SHA512

    9327136be2e30b62bfedb95743c2da3900a00cf6875eca88429da1d88948a44fa4e185fa80f6093bd2af1dd3aedef17af330b7e1520985f2ab7f2956f43046b9

  • SSDEEP

    12288:TplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:VxRQ+Fucuvm0as

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6eeb83661e6060bf9200e20ea621dc75_icedid_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\6eeb83661e6060bf9200e20ea621dc75_icedid_JC.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3608
    • C:\Program Files\having\towrite.exe
      "C:\Program Files\having\towrite.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1052

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\having\towrite.exe

    Filesize

    404KB

    MD5

    389b6d5acbfc77233cff342d1a18c3df

    SHA1

    754897a20cb0590d948874cf07b9ac7268353dec

    SHA256

    194457512c1ac17139d610050abb318e1a4417f4bc067fb8355d31228aa610d8

    SHA512

    e7c25e050f48cec538c66c8fd636cdf8fe06f629394caf5a5cc7569f0b9f8c93004b1cd7d22ba301a5b95a10fa4641f06e6f13db8e7186493af09a8e164f7ab3

  • C:\Program Files\having\towrite.exe

    Filesize

    404KB

    MD5

    389b6d5acbfc77233cff342d1a18c3df

    SHA1

    754897a20cb0590d948874cf07b9ac7268353dec

    SHA256

    194457512c1ac17139d610050abb318e1a4417f4bc067fb8355d31228aa610d8

    SHA512

    e7c25e050f48cec538c66c8fd636cdf8fe06f629394caf5a5cc7569f0b9f8c93004b1cd7d22ba301a5b95a10fa4641f06e6f13db8e7186493af09a8e164f7ab3