Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/02/2024, 05:18

General

  • Target

    2024-02-28_a4c245cbe03c58f30dd1e04892aa2d2c_icedid.exe

  • Size

    312KB

  • MD5

    a4c245cbe03c58f30dd1e04892aa2d2c

  • SHA1

    c5a772540f5387b74df58579d51d92cae8d6566c

  • SHA256

    2a5dc96eadea4acfa30c973ad9e06d7de41413971867c2f8df00e90b5cdb78c8

  • SHA512

    440cab57758e4bd903bbd350d938fe0acbdf614a87c0e5fc380b4398b109f2b86b2ebc78224a5953705083bb1d341a1b0db2b642ed83e273b161e4328f3a78c7

  • SSDEEP

    3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-28_a4c245cbe03c58f30dd1e04892aa2d2c_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-28_a4c245cbe03c58f30dd1e04892aa2d2c_icedid.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1152
    • C:\Program Files\shipped\against.exe
      "C:\Program Files\shipped\against.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2196

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Program Files\shipped\against.exe

          Filesize

          313KB

          MD5

          d17ed9c7d34bba06986e2ae45bc45414

          SHA1

          cd391a5478e9d71841b30704162505467d455aa4

          SHA256

          f48f3223bc981c9d426401a4d6ab86c91ca45a4482556c489723ebc7407d2134

          SHA512

          f7613c6d69f4fdab574e509440a5ca81cedecfca9080d8399b3e96059e3a7c31f9aca19a4b68a932602c9e5f0da098baf7f783e8ccd4b35394304e8d0b8a5ce5