Analysis

  • max time kernel
    93s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-02-2024 15:53

General

  • Target

    2024-02-25_d615d314c233a2eaba100d8dcf2114b5_icedid.exe

  • Size

    391KB

  • MD5

    d615d314c233a2eaba100d8dcf2114b5

  • SHA1

    6156fabe9339bafa89ac74ed76dfaf6b3b28d7ce

  • SHA256

    7abb664ba30534e0b40709d882a285e57c1083088e3f4e54a441a1511ddb8e68

  • SHA512

    3f36dead12be77d764fdb9229444b89b6eacaf6273b3cd9afca31c635ba32e8dd0bc7cbebc28eafdc217a113f9b81dcff5732f85fbeb104dd86b48f8a45ba1fb

  • SSDEEP

    12288:LplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:9xRQ+Fucuvm0as

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-25_d615d314c233a2eaba100d8dcf2114b5_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-25_d615d314c233a2eaba100d8dcf2114b5_icedid.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3228
    • C:\Program Files\existing\Windows.exe
      "C:\Program Files\existing\Windows.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4936

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\existing\Windows.exe

    Filesize

    391KB

    MD5

    4d98d9ce205f1283b228b9af97334753

    SHA1

    772ea3ba21f7ad79ae6f3a6b2addb091643aac4d

    SHA256

    78f2d20fa60c7d5010ed4a72cdaacc48c5ea335f21a6ba14d869da0db5064ccf

    SHA512

    af3a4209f753baca4f7ed5a4234536f30bcf133d085021bdf942bebb23f30578728746b52a93b9cc1fde6ff1803f2ca7c20db5d63a5e274e1052271fb6179f90