Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    19/02/2024, 03:26

General

  • Target

    2024-02-19_2168069734254e0ef46c8d11b068edae_icedid.exe

  • Size

    317KB

  • MD5

    2168069734254e0ef46c8d11b068edae

  • SHA1

    91af859ef4bf649f4bbc09f60e61d9d63d77e0d8

  • SHA256

    91cb6bb6e9d82bc2a6460f89ab6c2f4f510d70697301f6b6065f22a4d04e3c99

  • SHA512

    62f4e1864c4084ed027cf857a7cd7c0c72790cd3ac2c88b75302666fe9afc0e5b3d7edd99a26afd148fc335461a117d03f9bbcc3fca6ed36a29baf6608208994

  • SSDEEP

    3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-19_2168069734254e0ef46c8d11b068edae_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-19_2168069734254e0ef46c8d11b068edae_icedid.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2668
    • C:\Program Files\depend\function.exe
      "C:\Program Files\depend\function.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2716

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Program Files\depend\function.exe

          Filesize

          317KB

          MD5

          daa58282227081cd5a0cd5b786d30929

          SHA1

          405f00b5bd407c5acd95a5dd145d89fc87945c49

          SHA256

          d2d2f8bf1c3286bacc156e1cd9d151b40d6098ea307b16dbf8fee5f99cfca21a

          SHA512

          a50bbdef53975e590b28c16b887d11bfefad298f1aea5306f90fc0e44a5fc495d5909d36ee2d4ec508ba608b79f66b006969a944431877c3fee6954d30f917be