Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/03/2024, 18:50

General

  • Target

    2024-03-12_58a33fc9f880549fbb1caf383cd5c24f_icedid.exe

  • Size

    418KB

  • MD5

    58a33fc9f880549fbb1caf383cd5c24f

  • SHA1

    529b9fc224378e7c10728072d1a9315caac76315

  • SHA256

    0aa2af9c4a575443105fadae6b4fbbc54ceaacf9abc6418e9123db9b9353967d

  • SHA512

    49d2e9661cd277acfa0146c980dcd9d7cdf7098997e6802d18b41da08a30b1e70488298c97a2917da3e03f007abe1665d79c16c67d2b0e2d63c0c0540e58a2ac

  • SSDEEP

    12288:5plrVbDdQaqdS/KfraFErH8uB2Wm0SX/Nr5FU:7xRW+Fucuvm0a/

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-12_58a33fc9f880549fbb1caf383cd5c24f_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-12_58a33fc9f880549fbb1caf383cd5c24f_icedid.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:744
    • C:\Program Files\root\directory.exe
      "C:\Program Files\root\directory.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2540

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\root\directory.exe

          Filesize

          418KB

          MD5

          132bcb6c07d7059555ac2de6aad4d33d

          SHA1

          f5b1229fa93691e800645c754fcb8fe7dd5fa7ee

          SHA256

          c9ff8f8f25ab6a2d7554db1f2b116b846c949361fa4cbcfbbb571de9c5919e3d

          SHA512

          0c4c30254fa6772744ff550211ac6fa2c7c319db00036f64961188ff0b0c396e113c5d4ec1decf11c1c47850d8605e92546d4bdf8699454cffb6c4aecc402d87

        • C:\Program Files\root\directory.exe

          Filesize

          325KB

          MD5

          0b570829b4f7f145bd925294e4e01914

          SHA1

          c7d47d794547a36edd3e33b9d6bb430fd5ff369b

          SHA256

          9997c7324ac28516afb32c86a0f92b02c3dd345adb4b34286217f8a422720094

          SHA512

          4b5aa6a2ecb702b83f243c9b301ef453c6a21a4470e8d7daabceb6e28c43918eb17bb8f4854885015ceae75249b34951f412f529e07036b3749ff3eab6743631

        • memory/744-0-0x0000000000400000-0x0000000000573000-memory.dmp

          Filesize

          1.4MB

        • memory/744-5-0x0000000000400000-0x0000000000573000-memory.dmp

          Filesize

          1.4MB

        • memory/2540-6-0x0000000000400000-0x0000000000573000-memory.dmp

          Filesize

          1.4MB

        • memory/2540-7-0x0000000000400000-0x0000000000573000-memory.dmp

          Filesize

          1.4MB