Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/02/2024, 19:47

General

  • Target

    2024-02-28_478d41ef7cb563de2c1eeeb4eb3ca7be_icedid.exe

  • Size

    417KB

  • MD5

    478d41ef7cb563de2c1eeeb4eb3ca7be

  • SHA1

    cd79173d339f5435048768eeac26faed676e11e4

  • SHA256

    c01deab62d0d979d4ec1ff5cfc0829c696dcabb90ddf5f67605c2ee6629c533b

  • SHA512

    07b2920c4728cd20052e5e0cdfaf1e771e4574306467d2b830873521037458bb2ed451510a793f53ad6a9964da0a5746496b6cb647c69b471c8e37e50e44129c

  • SSDEEP

    12288:1plrVbDdQaqdS/ofraFErH8uB2Wm0SX/Nr5FU:nxRQ+Fucuvm0a/

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-28_478d41ef7cb563de2c1eeeb4eb3ca7be_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-28_478d41ef7cb563de2c1eeeb4eb3ca7be_icedid.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2176
    • C:\Program Files\findout\Diagnostic.exe
      "C:\Program Files\findout\Diagnostic.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2076

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\findout\Diagnostic.exe

    Filesize

    417KB

    MD5

    2b60f2ae43c0059f602d0976a8013089

    SHA1

    060703713de637dc787e3333e6a83957864839d9

    SHA256

    173985ea36143927d8d680ccbaa72ddbe82bf5fb90d316d2cf7d8f035d7c0a68

    SHA512

    e91d52cdf67b49d957d614d91b3363e57e6367931e7a4f832912485703fee121a2a46286b759556a8ba718373c3ad386f953c2d6abc53914486f845bd0cd9edd

  • memory/2076-6-0x0000000000400000-0x0000000000573000-memory.dmp

    Filesize

    1.4MB

  • memory/2076-7-0x0000000000400000-0x0000000000573000-memory.dmp

    Filesize

    1.4MB

  • memory/2176-0-0x0000000000400000-0x0000000000573000-memory.dmp

    Filesize

    1.4MB

  • memory/2176-5-0x0000000000400000-0x0000000000573000-memory.dmp

    Filesize

    1.4MB