Analysis

  • max time kernel
    90s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-03-2024 01:38

General

  • Target

    2024-03-13_5162238617368a0dadf511a69fe1051b_icedid.exe

  • Size

    431KB

  • MD5

    5162238617368a0dadf511a69fe1051b

  • SHA1

    a530058ab036218c22d07f9eb47162c5fd1b833c

  • SHA256

    6d751999263b77588f9c5f7e7c44d03acb04f6e2d8c71866eb50c2886d107315

  • SHA512

    838f070f6ab4390b8c6043dafcb7042aedd0357988a573965bd6a4c2159b677f120b3d4919d2df36e1be92ccdb08209217e72eb61389f276d2ee0cad6c3d4665

  • SSDEEP

    12288:fplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:xxRQ+Fucuvm0as

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-13_5162238617368a0dadf511a69fe1051b_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-13_5162238617368a0dadf511a69fe1051b_icedid.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Program Files\Autorun\compact.exe
      "C:\Program Files\Autorun\compact.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4524

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Autorun\compact.exe

    Filesize

    431KB

    MD5

    60260c583eb94cf7f18489b9be746951

    SHA1

    0f9bd83d40af984fc0a09cddc24d1297231be45e

    SHA256

    d29f50a83221be43690d24fd992386d73fb942c1542492d6d3327d559635452b

    SHA512

    cdc304deb5bbb0df053fd64ea360def750edc6647d3ca8c35296d15d1dec804f19691ee4758da41df406942684eeb73aa27d2064901a8c074d869c1b60b7d54a