Analysis

  • max time kernel
    152s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/03/2024, 19:55

General

  • Target

    2024-03-25_a4768e2a88652c568748e6849070fa19_icedid.exe

  • Size

    320KB

  • MD5

    a4768e2a88652c568748e6849070fa19

  • SHA1

    3cf5ec3488e5890b677ef215ba269f935eaca956

  • SHA256

    03f688efe71be8d7434b5760abedc855515776875b1f7d07c540eb32a1008a5a

  • SHA512

    9b70c81c240a416960022fcd9c519e25b35475a91df819dde2fe5b7f8a3ef6b9e504da1947c519696ca011af6d589a3dee682a746385970efbf020923af253ee

  • SSDEEP

    3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-25_a4768e2a88652c568748e6849070fa19_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-25_a4768e2a88652c568748e6849070fa19_icedid.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5060
    • C:\Program Files\supports\languages.exe
      "C:\Program Files\supports\languages.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3892

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\supports\languages.exe

    Filesize

    320KB

    MD5

    019c8f7157b6ec969fd34a48f7419f6d

    SHA1

    0b0d8491287d9c405399e897f49579a1946a347e

    SHA256

    5779fd19a317a5e91c5e40804ab46fda082f8afe9dc999c5b8ff67258566a6ec

    SHA512

    ddbd26e4a41fc9cc7e7490c77fc1c36e06351c0a6c212b8928f1154e9d1ef5c0aa7a02882382ff8245fa0608d33bfd4fb7fa3ae06ccc08c7ed760a08a7fc4523