Analysis

  • max time kernel
    136s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/02/2024, 08:12

General

  • Target

    2024-02-12_fc28175e4e943f3d313e3ff0de0311a4_icedid.exe

  • Size

    315KB

  • MD5

    fc28175e4e943f3d313e3ff0de0311a4

  • SHA1

    f5ebac4a3837d7415f46dd80dc1733bcc059b602

  • SHA256

    67606368758be3616b626aaf3b467cdd3ca186b1201b70050a461adbb84c9e4a

  • SHA512

    80fbbd6ae13a8f7e130a70b3717de7d8b0d3ae476e40f0a53105b73271e41bd57a57b1060d3f76beef39e74a24b3deaf494be181c143614bdabcb3124b0f8096

  • SSDEEP

    3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-12_fc28175e4e943f3d313e3ff0de0311a4_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-12_fc28175e4e943f3d313e3ff0de0311a4_icedid.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:792
    • C:\Program Files\perating\systems.exe
      "C:\Program Files\perating\systems.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2260

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\perating\systems.exe

          Filesize

          315KB

          MD5

          68c6c21405935c31adaafaaf0a9f9d12

          SHA1

          000fb712c585ab8cb8b2f79ed93c8142e4627a83

          SHA256

          9bbd8624936b2347680406d20af7244f7c9d113a6bf13cf3bf26f3f2e52593b1

          SHA512

          4e654e7c02d6a9869e24eea25903d94dac24487d42791c55d3502af78f8811fcc0f90be9d08d9d286d744142d91de72db387ffcbf48e7082fe457dc89d85dc3c