Analysis

  • max time kernel
    90s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-02-2024 22:26

General

  • Target

    2024-02-23_5e8b103540b0d85b0ab850b3478c8dc4_icedid.exe

  • Size

    425KB

  • MD5

    5e8b103540b0d85b0ab850b3478c8dc4

  • SHA1

    aed444254dff9e8c55742e081def084a6ca2a218

  • SHA256

    fc9cc1301d55d564581066d4a51f55227b5e08b441ec586b2b70c321b30c0e4b

  • SHA512

    7fcfc44cb2538b3d02c9cb6ac9617709f270d5247724ed3bdefde8f4c7a6c0ccdc542012da0cf5d3ede2e3b75334f4bdd05155cef86886f271029c2489563bf3

  • SSDEEP

    12288:wplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:MxRQ+Fucuvm0as

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-23_5e8b103540b0d85b0ab850b3478c8dc4_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-23_5e8b103540b0d85b0ab850b3478c8dc4_icedid.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1840
    • C:\Program Files\Debugging\Internals.exe
      "C:\Program Files\Debugging\Internals.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3048

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Debugging\Internals.exe

    Filesize

    425KB

    MD5

    977cc9c064d794d5f75a084c6bc18cf1

    SHA1

    cbfc4974dfe5f3d4ac344b28c77387addbe8bbd7

    SHA256

    ce5b1ed41c3e6ae656f4816608b7ec5c23636165ab8ba78707daaa24e602c98e

    SHA512

    3ce35859d09a7c33e22a632a8c1aa1c888e0364329780547eed19cca85e97345f4fd2aa1c1fc2c7bd7c0b2d9a41b265d899dfd2dcb676f72df731c6cf8ab73da