Analysis

  • max time kernel
    140s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/02/2024, 07:31

General

  • Target

    2024-02-17_44dddd35fc82b027f2176c69487e5814_icedid.exe

  • Size

    426KB

  • MD5

    44dddd35fc82b027f2176c69487e5814

  • SHA1

    21c719bb68594510a0513e92b4d525b1c22c1811

  • SHA256

    e0c6d2a003a25c246cc0439ede610d917a456c4fb7137eeb39ecdf9ffc19d3c7

  • SHA512

    8e51941b4bd8f061a785570344ffd204a1e47950b0f4b47765b3b9652fb4d25ea6a1b8c081803e465762a3a5ca8b07c488598df94575152d9ebc4d940599f37b

  • SSDEEP

    12288:KplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:mxRQ+Fucuvm0as

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-17_44dddd35fc82b027f2176c69487e5814_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-17_44dddd35fc82b027f2176c69487e5814_icedid.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Program Files\accordingly\Panel.exe
      "C:\Program Files\accordingly\Panel.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2204

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\accordingly\Panel.exe

    Filesize

    426KB

    MD5

    0476a9e60f7b959bed36ce52b9442ecd

    SHA1

    00817a321471b82d2588e60044136aebea695e6b

    SHA256

    58e97d78a1dfb8338b936ce7ae6e096c63a3720c0f688444c46f5afc919fb9a3

    SHA512

    88a88d23900fe21b50dd6604cf7f4bb2245947124d9e4213e185574f0e3ae0cf51712cb0d2095f02bd6e012cc6e159ec0603a9e5db53494a6d8f4b83092fe6ac