Analysis

  • max time kernel
    91s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/01/2024, 04:41

General

  • Target

    2024-01-24_161fbf0526eb5f3d7aa2880b58770e79_icedid.exe

  • Size

    2.3MB

  • MD5

    161fbf0526eb5f3d7aa2880b58770e79

  • SHA1

    cb9f8badf060f39f92b5664049f8cbc3321a2c69

  • SHA256

    3b6d6051d76b8415e4e3a9a2ebcb19a83ddc2b1cc28f6499eaed36d93fbe7052

  • SHA512

    c7ed2bc868a41f0d15b244209e6782cdb34d679b7b8377a8c4aa21dc5279d45d08a846d7399b4492da90c9b67b036ba4ce1dd73d3a13ab64bda483db7aad52ea

  • SSDEEP

    49152:1kivT8TpcV/rVtbK5DNfPu/lg7R0t8ihpEdDH:19TypyrnK5hfegR0Oig1H

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-24_161fbf0526eb5f3d7aa2880b58770e79_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-24_161fbf0526eb5f3d7aa2880b58770e79_icedid.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious use of SetWindowsHookEx
    PID:4192

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads