Analysis

  • max time kernel
    155s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-03-2024 12:55

General

  • Target

    2024-03-05_bacec4af0bee58296a73bcb9852b7557_icedid.exe

  • Size

    417KB

  • MD5

    bacec4af0bee58296a73bcb9852b7557

  • SHA1

    a992d6a7faef39ae418032f61b432bfd59108aff

  • SHA256

    81ada2d1225ebd4eae76dd2c7858555138ea1d4d67d7fce91ce621d5120dd99b

  • SHA512

    553fa3b18bea346ec0a1badfb9351a7b3da9ded2a4cbd4cb368f992ed50f3503738301d46c9904614d2326665859ad4135025727d2c05e5764f21f05ef04682c

  • SSDEEP

    12288:uplrVbDdQaqdS/ofraFErH8uB2Wm0SX/Nr5FU:axRQ+Fucuvm0a/

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-05_bacec4af0bee58296a73bcb9852b7557_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-05_bacec4af0bee58296a73bcb9852b7557_icedid.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3412
    • C:\Program Files\perating\systems.exe
      "C:\Program Files\perating\systems.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3520
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4088 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:116

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\perating\systems.exe

      Filesize

      417KB

      MD5

      5f6b3313d46f4eed2a4dfbc3006619f1

      SHA1

      3eaa6d78035cde481d0ce69b94e06eca409fdbb6

      SHA256

      3a1afee258518635be5dd13006324c9484cdddbfa7625c70def79cf81da90c36

      SHA512

      836f30e8ffdf26590b63e951da7cdfb202c5a8ba6bc8eb505d8c80b36b77a014712c17d29e2333e34301c38672a97e73515becd340d225fa666059fc102b1b99

    • memory/3412-0-0x0000000000400000-0x0000000000573000-memory.dmp

      Filesize

      1.4MB

    • memory/3412-6-0x0000000000400000-0x0000000000573000-memory.dmp

      Filesize

      1.4MB

    • memory/3520-5-0x0000000000400000-0x0000000000573000-memory.dmp

      Filesize

      1.4MB

    • memory/3520-7-0x0000000000400000-0x0000000000573000-memory.dmp

      Filesize

      1.4MB