Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/02/2024, 19:47

General

  • Target

    2024-02-28_478d41ef7cb563de2c1eeeb4eb3ca7be_icedid.exe

  • Size

    417KB

  • MD5

    478d41ef7cb563de2c1eeeb4eb3ca7be

  • SHA1

    cd79173d339f5435048768eeac26faed676e11e4

  • SHA256

    c01deab62d0d979d4ec1ff5cfc0829c696dcabb90ddf5f67605c2ee6629c533b

  • SHA512

    07b2920c4728cd20052e5e0cdfaf1e771e4574306467d2b830873521037458bb2ed451510a793f53ad6a9964da0a5746496b6cb647c69b471c8e37e50e44129c

  • SSDEEP

    12288:1plrVbDdQaqdS/ofraFErH8uB2Wm0SX/Nr5FU:nxRQ+Fucuvm0a/

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-28_478d41ef7cb563de2c1eeeb4eb3ca7be_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-28_478d41ef7cb563de2c1eeeb4eb3ca7be_icedid.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2348
    • C:\Program Files\Diagnostic\Tool.exe
      "C:\Program Files\Diagnostic\Tool.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2164

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Program Files\Diagnostic\Tool.exe

    Filesize

    417KB

    MD5

    2b17cd401841f9a8858e6589d82cd521

    SHA1

    d85c67101b87452f39e1f1dd67b277aa3d2b98bc

    SHA256

    ceae13c360f12c6050fb599f8d19a09caf9263f3b258b71827ea33842bf3e458

    SHA512

    181b6b1de8e8257a60574fdec7ae51ed401a1a6f90b2350d1237a0044b2a412b27603386fec14f5c1f2f30fa93b1cd54be66870c763193851c89fb6de5e04fad

  • memory/2164-10-0x0000000000400000-0x0000000000573000-memory.dmp

    Filesize

    1.4MB

  • memory/2164-12-0x0000000000400000-0x0000000000573000-memory.dmp

    Filesize

    1.4MB

  • memory/2348-0-0x0000000000400000-0x0000000000573000-memory.dmp

    Filesize

    1.4MB

  • memory/2348-4-0x0000000002630000-0x00000000027A3000-memory.dmp

    Filesize

    1.4MB

  • memory/2348-11-0x0000000000400000-0x0000000000573000-memory.dmp

    Filesize

    1.4MB