Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23/02/2024, 12:34

General

  • Target

    2024-02-23_4c58c9beb20602dd9b6314779eb2998d_icedid.exe

  • Size

    316KB

  • MD5

    4c58c9beb20602dd9b6314779eb2998d

  • SHA1

    74005aaff3e307eb8f94387f4992976346e03984

  • SHA256

    020fc74b5395aa37aca05fb5c3a7ad362cfb34bedd6a02bcf658f47b8bfda36d

  • SHA512

    136b7217d8ef711e54c0d3efc6d700a330c5842846b3848d9055b8ed18020fb31c9f9b2d44e73d387a04e4cfaf96f82d8c9268f2451e6dee43f70d0f3906e96e

  • SSDEEP

    3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-23_4c58c9beb20602dd9b6314779eb2998d_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-23_4c58c9beb20602dd9b6314779eb2998d_icedid.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2492
    • C:\Program Files\findout\Diagnostic.exe
      "C:\Program Files\findout\Diagnostic.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2592

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Program Files\findout\Diagnostic.exe

          Filesize

          316KB

          MD5

          4ee0ed26c66a3fcc244c2216a08aa652

          SHA1

          5962b4630bc7d532ef036a64aa575bae9753cc78

          SHA256

          f8f7c16d19e02a690c35497a7a43ea55182fe66fae555054a818b860c211493f

          SHA512

          fc97632ac769c00c0a20ff2000c7821491d70eae7028501fe065acf3e371fe5a8b35a2c7789565713132566a1a4553e7f405dcd87f94a0e2103e01c14364e78d