Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-02-2024 00:26

General

  • Target

    2024-02-03_5f33f458886531c4aa6b448b1a4cc0fb_icedid.exe

  • Size

    427KB

  • MD5

    5f33f458886531c4aa6b448b1a4cc0fb

  • SHA1

    901db69092353bd8ae4708cf69525fa0839c7646

  • SHA256

    31751ff651688239a6e3fb9c763badb16ea3d1704027dc8db833f93fb9238838

  • SHA512

    1a1ed5f2e530e297c8d7ace128b89733bf87b41e1270ab8bde0b3e15c51c2cfe3b9a06e933ee4e6e156be881cbffd3491989aea930d239f0b37736bfb8a109e5

  • SSDEEP

    12288:AplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:cxRQ+Fucuvm0as

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-03_5f33f458886531c4aa6b448b1a4cc0fb_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-03_5f33f458886531c4aa6b448b1a4cc0fb_icedid.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:64
    • C:\Program Files\Applications\and.exe
      "C:\Program Files\Applications\and.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3180

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Applications\and.exe

    Filesize

    427KB

    MD5

    782096e6a8516ad1a67a4355b80fdfe5

    SHA1

    650c5ebc6cca23f61c9de67d7a0ff34f3dd40316

    SHA256

    9296015d6d973bf3dc6a2beb015ca8e33c7ae12640ccd8ec59354d001161a12a

    SHA512

    12febc796441faa8d0b62c5c01aa1b86f5ce7310851f187b0a3bcf690badf40cb1be720ce06f266eec20e60efde76f5151d08fa97fbebc701752e999c5630e1e