Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15/03/2024, 01:21

General

  • Target

    2024-03-15_32bc0a7b28762f359a582601e29c03fe_icedid.exe

  • Size

    4.8MB

  • MD5

    32bc0a7b28762f359a582601e29c03fe

  • SHA1

    b3bb424533b4c32448b081fc799c056438615244

  • SHA256

    a75f33a11dfae22c89d316c96764a9c224b155508813b10b2653ad99398bb744

  • SHA512

    6fb9912b73444913d5e5b0bb450465028c5087b2e8c05c96ba4e17af7cb1be0559a0b19c5ab6d8cb67beef738f93beb69179ab6ba8372d845afbdbe4804b3408

  • SSDEEP

    98304:K8dH6yIUmsPUeeczoxUGm+cKAeIpFkKTpTmaFbh4kKVwlsxyOQ6:99IUPUpUGm+cJmGbhwCsxz9

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-15_32bc0a7b28762f359a582601e29c03fe_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-15_32bc0a7b28762f359a582601e29c03fe_icedid.exe"
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:320
    • C:\Users\Admin\AppData\Local\Temp\CPE6D0C.tmp\FlashRegistrar.exe
      C:\Users\Admin\AppData\Local\Temp\CPE6D0C.tmp\FlashRegistrar.exe R C:\Users\Admin\AppData\Local\Temp\CPE6D0C.tmp\Flash.ocx
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies registry class
      PID:2956

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\CPE6D0C.tmp\Flash.ocx

          Filesize

          31KB

          MD5

          4a1b5347d6e359198c87fb0c84c1900f

          SHA1

          ff1dca89c44db268b5037fc4fc602f34df627744

          SHA256

          c73fbd09683ca4026ba4ec1545fd06432959115d4fe007488974a601b603688c

          SHA512

          1b3a68e404c25cefbd2088e214421d1627eea4148fa63130f77fa78c1fce516b30c7cb17c020d98388dcb5406b7bcd1460b3519e6c28e2a181376abb24fbcbca

        • \Users\Admin\AppData\Local\Temp\CPE6D0C.tmp\Flash.ocx

          Filesize

          2.8MB

          MD5

          51b0593dddeb7e023518bed54da75860

          SHA1

          7b816b226b07fcf9dbfdc83a208e74e2738cb212

          SHA256

          60250f88a02e465b5de0ffc1f88e69316cb6b67b35a9a91a55b419a335be0aba

          SHA512

          14b1fe2d38f43c5d32ea0d3234c0b29d03a8be570ebe2b340827bc48ed49a1f6383a90cc97237a93a693847c550c54e3842474ce5699f99fc533e148e4c9e837

        • \Users\Admin\AppData\Local\Temp\CPE6D0C.tmp\Flash.ocx

          Filesize

          1.8MB

          MD5

          6dc268328625eef90cedaf812ac5ffa5

          SHA1

          9d361dea4b960d495d86bb66e1e92ac2620e7419

          SHA256

          9a218f070d0e8773efd4b09f752c3985d54094daea4615785e3121805889ff6d

          SHA512

          9eec95d10a862a8618d167b06ad8181e2dd8a0058553f461cbe2c7bdac39bd290cf99b17626457b416ba348c33cd3da0db6de7533765a33fb59620e97e4e80a1

        • \Users\Admin\AppData\Local\Temp\CPE6D0C.tmp\FlashRegistrar.exe

          Filesize

          63KB

          MD5

          ed4bb3a88c0d63c029126e6e5cba625e

          SHA1

          f6bbc2ee6079b006e5c811f1e0a1a36a8aafdebc

          SHA256

          0538bc97b726aa5a4c90705f0141eb86b26e240ea035ae4d96211f985d6220dd

          SHA512

          cda6b6adcdfc08f1846bbc55a514793960d7bebe792e3ac032ace2b83d1f00ebabcc69263ab66b1f8ed22487bedc6c816e795a66955f04da28a33621fe717a9e

        • memory/320-9-0x0000000002530000-0x0000000002531000-memory.dmp

          Filesize

          4KB