Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15-03-2024 00:29

General

  • Target

    2024-03-15_2da7136695532402049d2dd68eb9f14d_icedid.exe

  • Size

    418KB

  • MD5

    2da7136695532402049d2dd68eb9f14d

  • SHA1

    61e7154377e5892a5c143acb143f7bdf1945a251

  • SHA256

    d11cbe434d39400a839c262176b109e62466935649c60883f7848234f10d25c0

  • SHA512

    e3bfbd7cfa2c03d0acfb2bb546b1b0a94703ded10dfe94435f66e3662b261b118ca1369f065f1f9c0884add3f0b2e53b4a76d5047ff3da5a44978f61fb071073

  • SSDEEP

    12288:EplrVbDdQaqdS/KfraFErH8uB2Wm0SX/Nr5FU:AxRW+Fucuvm0a/

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-15_2da7136695532402049d2dd68eb9f14d_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-15_2da7136695532402049d2dd68eb9f14d_icedid.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Program Files\customizing\demonstrates.exe
      "C:\Program Files\customizing\demonstrates.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2052

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\customizing\demonstrates.exe

    Filesize

    418KB

    MD5

    951eb4585cc64b71eeb9ff1801699317

    SHA1

    a48626dde1285edb46558284c0e01362fff4c686

    SHA256

    90edd2b4a644053db524c24ddda34ccec4fd6cff0a8189b1a35d7de08911d028

    SHA512

    cd8aaa38f299cef9847efb91b5c7f7930991c0d150891ff62c026f63c59f2cef933b24616035919411f7abc42eac54d14b632f8ac6cee208ea01e71e7ef36d25

  • memory/2032-0-0x0000000000400000-0x0000000000573000-memory.dmp

    Filesize

    1.4MB

  • memory/2032-9-0x0000000002270000-0x00000000023E3000-memory.dmp

    Filesize

    1.4MB

  • memory/2032-11-0x0000000000400000-0x0000000000573000-memory.dmp

    Filesize

    1.4MB

  • memory/2052-10-0x0000000000400000-0x0000000000573000-memory.dmp

    Filesize

    1.4MB

  • memory/2052-12-0x0000000000400000-0x0000000000573000-memory.dmp

    Filesize

    1.4MB