Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/02/2024, 19:50

General

  • Target

    2024-02-01_37eaf1e757a9c76b5d5cac5d4b24402d_icedid.exe

  • Size

    427KB

  • MD5

    37eaf1e757a9c76b5d5cac5d4b24402d

  • SHA1

    44c96ba2550e870cca431adca8058bc9450865b3

  • SHA256

    d79f6ee80191b2f4b05503539ac9a030dc7b561c14f6d9b1a27166421dba9012

  • SHA512

    a1ae84105c138db249590668e156d1208afbfa97b90a5a7216c29f09ae7aa4ff22b354fc81a8828aaeaaea67e1d2db6e833a902b5b37bbd2cc45182912f054e6

  • SSDEEP

    12288:4plrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:kxRQ+Fucuvm0as

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-01_37eaf1e757a9c76b5d5cac5d4b24402d_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-01_37eaf1e757a9c76b5d5cac5d4b24402d_icedid.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4224
    • C:\Program Files\contain\Dsetup1.exe
      "C:\Program Files\contain\Dsetup1.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:5108

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\contain\Dsetup1.exe

    Filesize

    428KB

    MD5

    4d94026fb10c3f1ea32e04f8a969d6a8

    SHA1

    d7fa13f7af3bd13de6792b708cec13898ad626b5

    SHA256

    9114e330e35178fc8cd99602c52c3bc18c154979d125a9d301e75c878d4f2e8d

    SHA512

    caa9163f971cdcdd53a836928442fe7d444b0af91900ec42f570e1b3922c710650844bbab5af84486292ced6016b89434da2efdef209e638331dbfc586bf7fda