Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    02-09-2023 16:27

General

  • Target

    2023-08-22_41d25a8bbc86e7d90de19fe06cdb5aaf_icedid_JC.exe

  • Size

    377KB

  • MD5

    41d25a8bbc86e7d90de19fe06cdb5aaf

  • SHA1

    828fc9b73fd65ad2a08915edde91d207281bb37a

  • SHA256

    88edf2c3a58acd4d420e264571f9eaa3eb4ba1dea5809a863c39f15ed251c132

  • SHA512

    7b56a3709fe94ca1fc584665b2e91c28cd17744a134061b3f48df4c6727e986549cb26a6dcfbaf254818c2cc445d1da8c14d98c8d0d52c131ddcf89b5394c143

  • SSDEEP

    6144:PplrlbbDdQaqd2X/96fr3KFEUGjr8uB2WgcA0cpXEVNrvGZ4FUqm6:PplrVbDdQaqdS/ofraFErH8uB2Wm0SXj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2023-08-22_41d25a8bbc86e7d90de19fe06cdb5aaf_icedid_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\2023-08-22_41d25a8bbc86e7d90de19fe06cdb5aaf_icedid_JC.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:832
    • C:\Program Files\components\existing.exe
      "C:\Program Files\components\existing.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1680

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\components\existing.exe

    Filesize

    377KB

    MD5

    065691d940b85520f0f4ddf47b7a98cb

    SHA1

    df74244ecf27d77aa2e3114242bf6c63e64217cc

    SHA256

    e60b10471f25baccd93c5248069803da0b5dba3d5700aa3510e9c8bc85a87918

    SHA512

    9629f7c217008e24333db9893a0f1a441bafcb9cbf3148e3eb118ece30aef77fe5b786b07accb4f5cb24405b1b9ed61099832c014f15506fd110e5b5dcbaf76a

  • C:\Program Files\components\existing.exe

    Filesize

    377KB

    MD5

    065691d940b85520f0f4ddf47b7a98cb

    SHA1

    df74244ecf27d77aa2e3114242bf6c63e64217cc

    SHA256

    e60b10471f25baccd93c5248069803da0b5dba3d5700aa3510e9c8bc85a87918

    SHA512

    9629f7c217008e24333db9893a0f1a441bafcb9cbf3148e3eb118ece30aef77fe5b786b07accb4f5cb24405b1b9ed61099832c014f15506fd110e5b5dcbaf76a

  • \Program Files\components\existing.exe

    Filesize

    377KB

    MD5

    065691d940b85520f0f4ddf47b7a98cb

    SHA1

    df74244ecf27d77aa2e3114242bf6c63e64217cc

    SHA256

    e60b10471f25baccd93c5248069803da0b5dba3d5700aa3510e9c8bc85a87918

    SHA512

    9629f7c217008e24333db9893a0f1a441bafcb9cbf3148e3eb118ece30aef77fe5b786b07accb4f5cb24405b1b9ed61099832c014f15506fd110e5b5dcbaf76a

  • \Program Files\components\existing.exe

    Filesize

    377KB

    MD5

    065691d940b85520f0f4ddf47b7a98cb

    SHA1

    df74244ecf27d77aa2e3114242bf6c63e64217cc

    SHA256

    e60b10471f25baccd93c5248069803da0b5dba3d5700aa3510e9c8bc85a87918

    SHA512

    9629f7c217008e24333db9893a0f1a441bafcb9cbf3148e3eb118ece30aef77fe5b786b07accb4f5cb24405b1b9ed61099832c014f15506fd110e5b5dcbaf76a