Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2023, 13:40

General

  • Target

    922f2dbabbf04bd53d4d049f3895c9d1_icedid_JC.exe

  • Size

    376KB

  • MD5

    922f2dbabbf04bd53d4d049f3895c9d1

  • SHA1

    3f7c08cecbb6d7c645aaca207576399aec14b657

  • SHA256

    4a200d5b1863dbfc4352a7f6515db8286be5459c7b80b6bd10570d5bd9a6ec47

  • SHA512

    54656c3ea673e939e0d7e53572afe0807ad5749cf1c1a23c4f7cb74cce5c5f3d5d4839da0db5edf6f16c912328550d47bb482fa7d0e3696e5e682e553d9513ef

  • SSDEEP

    6144:2plrlbbDdQaqd2X/96fr3KFEUGjr8uB2WgcA0cpXEVNrvGZ4FUqm6:2plrVbDdQaqdS/ofraFErH8uB2Wm0SXj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\922f2dbabbf04bd53d4d049f3895c9d1_icedid_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\922f2dbabbf04bd53d4d049f3895c9d1_icedid_JC.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Program Files\necessary\system.exe
      "C:\Program Files\necessary\system.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2368

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\necessary\system.exe

          Filesize

          376KB

          MD5

          3a42eb3672ccad8ded07dfab3e099673

          SHA1

          2f8f2bd7d5837188cce8c3e4d520035344dbe894

          SHA256

          820e95aa5ab4ce1e516a43f55a15de5c12dde2eda849609ca08c69decb749ef3

          SHA512

          68e6edb898965678094c87796d73a2a9cf08276a8f0896e92de3177463a7d6794b8e1664e8933dc60e67a68a812385c86961bcb5ca5b208752317be12feacb2e

        • C:\Program Files\necessary\system.exe

          Filesize

          376KB

          MD5

          3a42eb3672ccad8ded07dfab3e099673

          SHA1

          2f8f2bd7d5837188cce8c3e4d520035344dbe894

          SHA256

          820e95aa5ab4ce1e516a43f55a15de5c12dde2eda849609ca08c69decb749ef3

          SHA512

          68e6edb898965678094c87796d73a2a9cf08276a8f0896e92de3177463a7d6794b8e1664e8933dc60e67a68a812385c86961bcb5ca5b208752317be12feacb2e

        • \Program Files\necessary\system.exe

          Filesize

          376KB

          MD5

          3a42eb3672ccad8ded07dfab3e099673

          SHA1

          2f8f2bd7d5837188cce8c3e4d520035344dbe894

          SHA256

          820e95aa5ab4ce1e516a43f55a15de5c12dde2eda849609ca08c69decb749ef3

          SHA512

          68e6edb898965678094c87796d73a2a9cf08276a8f0896e92de3177463a7d6794b8e1664e8933dc60e67a68a812385c86961bcb5ca5b208752317be12feacb2e

        • \Program Files\necessary\system.exe

          Filesize

          376KB

          MD5

          3a42eb3672ccad8ded07dfab3e099673

          SHA1

          2f8f2bd7d5837188cce8c3e4d520035344dbe894

          SHA256

          820e95aa5ab4ce1e516a43f55a15de5c12dde2eda849609ca08c69decb749ef3

          SHA512

          68e6edb898965678094c87796d73a2a9cf08276a8f0896e92de3177463a7d6794b8e1664e8933dc60e67a68a812385c86961bcb5ca5b208752317be12feacb2e