Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09-03-2024 17:29

General

  • Target

    2024-03-09_3335f92bfcd56dbff1bc50fdaac06820_icedid.exe

  • Size

    418KB

  • MD5

    3335f92bfcd56dbff1bc50fdaac06820

  • SHA1

    e605b3c0c9ebced578ea639b89813a1050b8506d

  • SHA256

    0165f3604f3bb444142d75d49e373f8f5ea44144ee2fa3981c204b93047472dd

  • SHA512

    7ffe5cd6534870de50b9fe47e94e8affb44df9baf529f79c92fc71014c180128ecc8136e45b9140f4071a93fd856a76a95f65bcff47146170fa6c64b3acc0731

  • SSDEEP

    12288:nplrVbDdQaqdS/KfraFErH8uB2Wm0SX/Nr5FU:JxRW+Fucuvm0a/

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-09_3335f92bfcd56dbff1bc50fdaac06820_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-09_3335f92bfcd56dbff1bc50fdaac06820_icedid.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Program Files\languages\Chinese.exe
      "C:\Program Files\languages\Chinese.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2168

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Program Files\languages\Chinese.exe

    Filesize

    419KB

    MD5

    b30af773005cccb8175c9a23bb8053d9

    SHA1

    f086bf0763290d7f0fac2585d43e4b3a14d3c390

    SHA256

    39c5bfff9cd88e31fd2a4a491f381106f4571536b7fe82ed53c20980f6749c1f

    SHA512

    25ca4a807c2780db24c1e49409970b20d0168d8886b9453bad8a6e528ca6f11c07500c1fe36fbfedd0fef0edc4bdd90bdf6b2b5d0031679604245b66c2f2732f

  • memory/1720-0-0x0000000000400000-0x0000000000573000-memory.dmp

    Filesize

    1.4MB

  • memory/1720-10-0x0000000000400000-0x0000000000573000-memory.dmp

    Filesize

    1.4MB

  • memory/1720-11-0x0000000002690000-0x0000000002803000-memory.dmp

    Filesize

    1.4MB

  • memory/1720-8-0x0000000002690000-0x0000000002803000-memory.dmp

    Filesize

    1.4MB

  • memory/1720-13-0x0000000002690000-0x0000000002803000-memory.dmp

    Filesize

    1.4MB

  • memory/2168-12-0x0000000000400000-0x0000000000573000-memory.dmp

    Filesize

    1.4MB

  • memory/2168-14-0x0000000000400000-0x0000000000573000-memory.dmp

    Filesize

    1.4MB