Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    12/03/2024, 03:30

General

  • Target

    2024-03-12_2c4e5af27020d8fee93b481ab746dc25_icedid.exe

  • Size

    266KB

  • MD5

    2c4e5af27020d8fee93b481ab746dc25

  • SHA1

    9594b669b5928dd295252e51242d48e39bfa9c33

  • SHA256

    f8024928fc162b315486441de63dd14d6fec358c76e71c78e216535c3d016aa3

  • SHA512

    3a1f49d1e3eaeb50fd75db00c6bcff3667a8b8d5360ead4ebd20907d24849fbb98b0548439c4efa83fd037a288ba0d7779b0e533377ccfea2cc002dd725eb229

  • SSDEEP

    3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-12_2c4e5af27020d8fee93b481ab746dc25_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-12_2c4e5af27020d8fee93b481ab746dc25_icedid.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Program Files\contain\Dsetup1.exe
      "C:\Program Files\contain\Dsetup1.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:760

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Program Files\contain\Dsetup1.exe

          Filesize

          267KB

          MD5

          c98b99495569cfde98f2383025a7c266

          SHA1

          dad432043784eb8ddadcffac3f38e6b10af60e1b

          SHA256

          b37daff630086b0000adfb87708a031f5426c163a86ae88919e12bd0be68a07d

          SHA512

          aecaa49bcd980bc940515839ce57fa69e879e77e77a08fe4f3c3fa38c6097c9a42b56d6b2996a82022f8a39cca4651aaeeb7482b879d165049614f29eeabdab3