Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-01-2024 04:32

General

  • Target

    2024-01-29_595c0856fa614ba0e9018acf0bbbfc33_icedid.exe

  • Size

    389KB

  • MD5

    595c0856fa614ba0e9018acf0bbbfc33

  • SHA1

    d8dc0c20975eb2aba75a5be828b9fd12eaabe5e1

  • SHA256

    e72f6bee25a923889f2bd02b0058925bd865eec5c69a5fca07f95c48d44b4259

  • SHA512

    82c1af562848a764477213810dc418bcb8095f714e2098124724fc4b70b1607e7de2d81e0df30fb122af89d22ba4d0b882f1afc07283029ad7fa59ab0d164800

  • SSDEEP

    12288:9plrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:fxRQ+Fucuvm0as

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-29_595c0856fa614ba0e9018acf0bbbfc33_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-29_595c0856fa614ba0e9018acf0bbbfc33_icedid.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1916
    • C:\Program Files\future\instead.exe
      "C:\Program Files\future\instead.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2888

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\future\instead.exe

    Filesize

    389KB

    MD5

    d2050fdb916a44d1b156807030fe091a

    SHA1

    bc8cca1716b82d163f3732e9b6be67f340b7e277

    SHA256

    f78a9a12981b9272702e098d722f04527d42f9ee446c7335f4aff36690923370

    SHA512

    4c9e3eba0ebf743c82fc3d17718e87c1ff09d53a6464a5f31b9c74da4aab187c2080420f72c28ec208772c1d65b5c384ea4e824e86c2fa87a609287afa571f3c