Analysis

  • max time kernel
    129s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-03-2024 18:31

General

  • Target

    2024-03-25_5e5aa34b1c365a0528918d850ac1edc1_icedid_virut.exe

  • Size

    190KB

  • MD5

    5e5aa34b1c365a0528918d850ac1edc1

  • SHA1

    de4bd94678655ee9559aa30d6680d8fbf2f3ff75

  • SHA256

    7209ffb794560ecc1b3df19f3ab4c97cf5eec4b68eddd6ba0d3f068d1b4b273c

  • SHA512

    a1ecd7835e0eacbf4c3bb5737b932336759cbb8d6e5c423235059d302b04f373cf18bf3d3b818a2c92b73623c51ac43473c9babd5018df4af799ac49267aea65

  • SSDEEP

    3072:IDI8Es6UNK3+IvpRwqjthRvXy1gycrd7rL05s2FYruLldtUqp8:X8d90+IR2qNKfCcK2x5Eg8

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1156
      • C:\Users\Admin\AppData\Local\Temp\2024-03-25_5e5aa34b1c365a0528918d850ac1edc1_icedid_virut.exe
        "C:\Users\Admin\AppData\Local\Temp\2024-03-25_5e5aa34b1c365a0528918d850ac1edc1_icedid_virut.exe"
        2⤵
        • Adds Run key to start application
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:2972
        • C:\Users\Admin\AppData\Local\Temp\2024-03-25_5e5aa34b1c365a0528918d850ac1edc1_icedid_virut.exe
          "C:\Users\Admin\AppData\Local\Temp\2024-03-25_5e5aa34b1c365a0528918d850ac1edc1_icedid_virut.exe"
          3⤵
            PID:2996

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1156-5-0x00000000025F0000-0x00000000025F1000-memory.dmp

        Filesize

        4KB

      • memory/1156-6-0x00000000025F0000-0x00000000025F1000-memory.dmp

        Filesize

        4KB

      • memory/2972-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2972-2-0x0000000000250000-0x0000000000284000-memory.dmp

        Filesize

        208KB

      • memory/2972-7-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2996-3-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2996-1-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB