Analysis

  • max time kernel
    151s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-03-2024 12:39

General

  • Target

    2024-03-26_696404e4b5309d68bd395401256f3c32_icedid.exe

  • Size

    378KB

  • MD5

    696404e4b5309d68bd395401256f3c32

  • SHA1

    03c57198b62d55fc912e2506e876afdf2be1a7ef

  • SHA256

    ae67ecf171250815eca717ff1525362221f24f217caf7fb90d54c0ff82839d4c

  • SHA512

    aa18516d5e632fa685ffac61a2bf9cdd573438bd84edde8e90208a35d637fa9fb3059e539ff62c8290b0caf83fa5772a8cbcfa528a6c7509148483f62c0a6443

  • SSDEEP

    6144:EplrlbbDdQaqd2X/96fr3KFEUGjr8uB2WgcA0cpXEVNrvGZ4FUqm6:EplrVbDdQaqdS/ofraFErH8uB2Wm0SXj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-26_696404e4b5309d68bd395401256f3c32_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-26_696404e4b5309d68bd395401256f3c32_icedid.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4180
    • C:\Program Files\Schirmer\Addison.exe
      "C:\Program Files\Schirmer\Addison.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1836
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3780 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:2120

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Schirmer\Addison.exe

      Filesize

      379KB

      MD5

      92b3c5d6a3c4c43983c0decb17b1ba8f

      SHA1

      ac7d08ac400720f102af1276a021ee573a233446

      SHA256

      c33aa416a4a13a4e58a15a4309f5b01e95c854e7e7a676fe605ba9c5fe4fd962

      SHA512

      c8329c41512062b0e095410ccb8cef6a63290a445a558b3e0880459d81da2d3cf534e522c5cbfff81297e065f22571fca466becc1731f65ddaf9dc8d7dad52ac