Analysis

  • max time kernel
    91s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-02-2024 17:54

General

  • Target

    2024-02-12_e599ce3f5fbaa15d169665445fd1aec1_icedid.exe

  • Size

    390KB

  • MD5

    e599ce3f5fbaa15d169665445fd1aec1

  • SHA1

    814f665fedda6dc6d1b82260a5b121e553daca99

  • SHA256

    e3c04d21d51e8f9e3bc34cbd4aea38cb026d57a52cbced6b1248197fadd84144

  • SHA512

    07e7235a267d77dcc2724b0cc256b707c0fd62fe69ed9da349b2e99c0a4c205ddbf0c8100c8ce14244cb12055926098e3f8a1c3d55ea8a61c2ba65601108a2bb

  • SSDEEP

    12288:DplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:FxRQ+Fucuvm0as

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-12_e599ce3f5fbaa15d169665445fd1aec1_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-12_e599ce3f5fbaa15d169665445fd1aec1_icedid.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2600
    • C:\Program Files\GetDXVer\Sample.exe
      "C:\Program Files\GetDXVer\Sample.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1572

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\GetDXVer\Sample.exe

    Filesize

    390KB

    MD5

    ca61f772630500546164ed48dcdefb9a

    SHA1

    66039b76de890d13b2c04de3f989fcffb9f1dc01

    SHA256

    d1db85e547ca59fd283207dd9700c6f788ce49899f7565513b61686189b2b6d4

    SHA512

    69f3e110e82c6a3cc628a192ca6b4b5ae273ef9192cd58370f57be17b702ac60f99a2cdb7da2096fb273cbfccf5c8e12329ee207c26a516b7443f6f383cbfac9