Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    18/01/2024, 22:22

General

  • Target

    2024-01-18_01908d4d14b0879718dd1115be1795bf_icedid.exe

  • Size

    304KB

  • MD5

    01908d4d14b0879718dd1115be1795bf

  • SHA1

    ac376715d3adb7da2f25b2436eb51be7aff28bf6

  • SHA256

    912c53601749f22e3a6d6f3a06960dd7ddb3b698d7f77a6180a64ef8ba6caf8a

  • SHA512

    b3ddee70a540965e60cc9c11a4bb6a59abe439a6fc9e5d131f00b8a80185b73476a43f1238acdb00121f297db3f2a0a8655ad349185e0b19032f94a63d1dc590

  • SSDEEP

    3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-18_01908d4d14b0879718dd1115be1795bf_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-18_01908d4d14b0879718dd1115be1795bf_icedid.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2780
    • C:\Program Files\customizing\demonstrates.exe
      "C:\Program Files\customizing\demonstrates.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2468

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Program Files\customizing\demonstrates.exe

          Filesize

          304KB

          MD5

          02c685fb2cdbf1df50f75c094d721dd8

          SHA1

          fa9b6ad998790f5a498cd1811a371bbb106169f7

          SHA256

          49ed93a733bedb1b8e86fc9fd086c1f8d983ad5c5483ac7006c181db23bd7e38

          SHA512

          b5c0d1d88bfaa870233d828fe7772ac76dc95f9b04cf3d4fb05bcd14a865a86eb9b81ad28eb68219e4e699c2877f8327e285d2f83e6fdd6a98a4e0d2ed381242