Analysis

  • max time kernel
    119s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    14/02/2024, 06:46

General

  • Target

    2024-02-14_fdf06bdb7b43aef0cc382e685099ee39_icedid.exe

  • Size

    317KB

  • MD5

    fdf06bdb7b43aef0cc382e685099ee39

  • SHA1

    73c31850ec85d280ed131959b8257fbb45be4cd0

  • SHA256

    bbc325afa594452dfdb4659855310e966cd326d30d1a652b710f08bc094c619f

  • SHA512

    fe5c0998f689aa5a029ce8a3f2a5fa62d4976cd25b0f6460a4ce50317bba3de924d43382afa270665156611a7a605c0f379a4d217275ad67d3d66dc15bbe9e4e

  • SSDEEP

    3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-14_fdf06bdb7b43aef0cc382e685099ee39_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-14_fdf06bdb7b43aef0cc382e685099ee39_icedid.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2680
    • C:\Program Files\Checking\Installed.exe
      "C:\Program Files\Checking\Installed.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:2736

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Program Files\Checking\Installed.exe

          Filesize

          317KB

          MD5

          cc0089a88add8a023de8aa4e0d8af4eb

          SHA1

          dd541bb24245bb9d4a1459148791f202c19202f6

          SHA256

          414441bda9049711d0ad8d8521af31427b6ac57857d2015335ae963e9df5841b

          SHA512

          ab7bd1fe5562a95139fd69cf5f3345e416788df813f970faf7910ab5e83f890aa3e5fbbb3a2aad0a26709374f5de83213ccef71de6667183f7934ae4a78315a1