Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27/03/2024, 19:46

General

  • Target

    2024-03-27_2f1faa154e7834a4052566a95ba69458_icedid.exe

  • Size

    419KB

  • MD5

    2f1faa154e7834a4052566a95ba69458

  • SHA1

    8db4ee1613e24e8c82988d700710f52a0f6c9a9f

  • SHA256

    959e1680e3787614315780685aeef59183e3d9e30a84340305e19df3cac60c2c

  • SHA512

    0c5c8ac39d86d10cf632cca8502ae97d50bb38599ac223b03dda6272fa2955d7d156d1db4fb2d8e5a6883d9cdb1ba5ff44e17677a39366ffb76d2f0d77fbe64d

  • SSDEEP

    12288:EplrVbDdQaqdS/KfraFErH8uB2Wm0SX/Nr5FU:AxRW+Fucuvm0a/

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-27_2f1faa154e7834a4052566a95ba69458_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-27_2f1faa154e7834a4052566a95ba69458_icedid.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1196
    • C:\Program Files\games\that.exe
      "C:\Program Files\games\that.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2224

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Program Files\games\that.exe

    Filesize

    419KB

    MD5

    d0d8abf0b4cc57fa4bc2931b6110d084

    SHA1

    15f54d7e998bd5a8923041bdd8090c05583134ad

    SHA256

    c888c3946f0e0c4274c5d3cbe8b94430bf964e60f85408b6fb233d4bd9675e2d

    SHA512

    0c179a67106bfeeaa67ec7349e6be11e9e7ebd6ace46343a70ff3d923dbbb725738c5cf91c8b0e3ec32670393501baec9f37e4654fdb2a9e90ca74a3644bd7ec

  • memory/1196-0-0x0000000000400000-0x0000000000573000-memory.dmp

    Filesize

    1.4MB

  • memory/1196-10-0x0000000000400000-0x0000000000573000-memory.dmp

    Filesize

    1.4MB

  • memory/1196-9-0x00000000028B0000-0x0000000002A23000-memory.dmp

    Filesize

    1.4MB

  • memory/2224-11-0x0000000000400000-0x0000000000573000-memory.dmp

    Filesize

    1.4MB

  • memory/2224-12-0x0000000000400000-0x0000000000573000-memory.dmp

    Filesize

    1.4MB