Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09/03/2024, 06:40

General

  • Target

    2024-03-09_d5c61b9d4d9e42d723c37ebe71259887_icedid.exe

  • Size

    320KB

  • MD5

    d5c61b9d4d9e42d723c37ebe71259887

  • SHA1

    7ace1d33530f6f54569c49dc30d4982faac98277

  • SHA256

    84b05c459aae04987075346b83b62d5db0d4cbc133414dd65f8477c736107773

  • SHA512

    3531491df39e052330d87ebd6af8249da82e7b05dcf6bdf78bced60c7c57cbfc429bcf9fbefbdb4a8be20da922fe8f383e637ff8641e4078dadd57d77dee1b90

  • SSDEEP

    3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-09_d5c61b9d4d9e42d723c37ebe71259887_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-09_d5c61b9d4d9e42d723c37ebe71259887_icedid.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2160
    • C:\Program Files\optional\Before.exe
      "C:\Program Files\optional\Before.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2532

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Program Files\optional\Before.exe

          Filesize

          320KB

          MD5

          0e3a56bfb4111f2256857257f90be642

          SHA1

          2576109924b60299c42213e13d30affcae6b658f

          SHA256

          0b3f7d60d552c267ffd52c45e69983afb832273278513470e4730f240c2bbd50

          SHA512

          c696eb83d02f25f35fd4e3c33b20ef73a0e42429cef02462fa05d5c1c2b3d64927f5e8e204ff653d20b78cbcda8c5e75ef0e5516216baf7c1253ff6085c927d2