Analysis

  • max time kernel
    157s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-03-2024 19:57

General

  • Target

    2024-03-26_c36a83abc74549a96c9b1a951f11f153_icedid.exe

  • Size

    384KB

  • MD5

    c36a83abc74549a96c9b1a951f11f153

  • SHA1

    bce99a2b13b93c76bb961d51c2916cd1b286ae3d

  • SHA256

    cd91181c9043693c36684fe29a8a2859fb075590615a83b304b9c088e164ab4b

  • SHA512

    d2c07d0c840130b10b42ad3d1f76b7d50bf20c87ef3ee14bc26683dfb6f9e5e4e3e8e298395333078cdb618979d943c6d8d70fc2f4e4835f694c6123bb131be3

  • SSDEEP

    12288:8plrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:IxRQ+Fucuvm0as

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-26_c36a83abc74549a96c9b1a951f11f153_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-26_c36a83abc74549a96c9b1a951f11f153_icedid.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2200
    • C:\Program Files\indicator\Suppress.exe
      "C:\Program Files\indicator\Suppress.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1576

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\indicator\Suppress.exe

    Filesize

    384KB

    MD5

    9528b1ac3e7514344cf553bec46614c2

    SHA1

    099dbdb1d1d1ad2fdf2c4b0a45df8ef7e7a27cfc

    SHA256

    c2be3dcf94952b5061d18e6259dbdf7e5658a7ad1f95b0944c0f25b0d2d8944b

    SHA512

    bf850c0af73cd737194190f4954c05624b45826e2e8f7a125e60dd6e68aa95858b3813c62db00d4b774de5f48a63acadfdbe32d431827ffb637472167198d900