Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/01/2024, 05:59

General

  • Target

    2024-01-11_5fbb1040e6fd840ad0289baf876ee93b_icedid.exe

  • Size

    424KB

  • MD5

    5fbb1040e6fd840ad0289baf876ee93b

  • SHA1

    6caf39d3cfa75dbda9388466bbda089af9500f4b

  • SHA256

    eb633d761352c342aed69c96bb2e1c6f258b2b2fd197a4a67a4d886d4cd6e1e6

  • SHA512

    0b086f0afb7b10952206319a3a6d808662ff3c861b6f15538ce48a1b76dd34eb259cc5df2d80714dc50ad6e358b33f4f86a077b13437a9f4004d293fb81e1bd7

  • SSDEEP

    12288:hplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:zxRQ+Fucuvm0as

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-11_5fbb1040e6fd840ad0289baf876ee93b_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-11_5fbb1040e6fd840ad0289baf876ee93b_icedid.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1196
    • C:\Program Files\boxes\integrate.exe
      "C:\Program Files\boxes\integrate.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:544

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\boxes\integrate.exe

          Filesize

          424KB

          MD5

          14ec1a9508dd01bfbfc8f6031ea358fe

          SHA1

          95e22f3d2961d1422bf49336aa6795fd7166b12c

          SHA256

          09b17133fe756214f471db1f4b1b93ef1218bb3474bbe1b2b6192fa566072223

          SHA512

          8abaeab09014625dafdabe4740703e560a6a21bf5a8fac08cd202a5be70c28a04c4a80c1ebdc53359b4f2115053ca8e2c7856cf6e4cd4c149dfeadf5412d40e6