Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    16/08/2023, 17:11

General

  • Target

    093835f9ff94f16e7e366bf2c231003d_icedid_JC.exe

  • Size

    6.5MB

  • MD5

    093835f9ff94f16e7e366bf2c231003d

  • SHA1

    97d082663fa8d3031b8af9ae20f9fb8ad3fe312e

  • SHA256

    b71b9fce1375705578c7047896381d9eb717c87e485113d972f943efba06237e

  • SHA512

    6b30bf29abdd24d99bb7f17ae8fcdd8fefcb8d09d77692b65665348f8cfe1c299aaf050e29359b8ec69af46b85091e0cd75d3c153e65f931b48b67ce633804fa

  • SSDEEP

    98304:3+5xKM1Woww2E5T3DoXSG8kM8pNhS9Yw8yp:wS7aTcXSL8Hwfp

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\093835f9ff94f16e7e366bf2c231003d_icedid_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\093835f9ff94f16e7e366bf2c231003d_icedid_JC.exe"
    1⤵
    • Drops file in Drivers directory
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2224

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\Uninstall.exe

    Filesize

    6.5MB

    MD5

    1760baab568b94185d6a8c52e390d241

    SHA1

    ed5bc1825ffabfeb55cc5e3006778da6af8b5aef

    SHA256

    90185d4bf9246a9e2fae67a818407d904edfb14b8cebde9abc07db9d8ea618fc

    SHA512

    4a3639e2843eea9b3e572a9e5d28677f22b6e9881bbafc8cf6484d2996e6b4bf6c26ac8c1382e8b2f386ef1924d370ce6406d078b16cb4548df6115ed764b9c5