Analysis

  • max time kernel
    119s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    04/04/2024, 21:26

General

  • Target

    2024-04-04_1ed74a641a553abeacfbd4737c2e4ee5_icedid.exe

  • Size

    389KB

  • MD5

    1ed74a641a553abeacfbd4737c2e4ee5

  • SHA1

    7d552f5b9238d87c5fb74a42f1b99bdc3cc412ba

  • SHA256

    0e8484bdcab31231b655059afde2b3f63c1f46b231a464d23326bea3b5c94d5a

  • SHA512

    c841f29459920a985b9538c20fb3c44b736ef23b9b55ffb6eda603e32d0e29fdde753d1fb48a0de98f854662b0264bf5c070ea3e66547345bbc466f75869b5f3

  • SSDEEP

    12288:dplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:/xRQ+Fucuvm0as

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-04_1ed74a641a553abeacfbd4737c2e4ee5_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-04_1ed74a641a553abeacfbd4737c2e4ee5_icedid.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Program Files\and\games.exe
      "C:\Program Files\and\games.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2376

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Program Files\and\games.exe

    Filesize

    389KB

    MD5

    20120993f77ef16976f1982cccfe72cc

    SHA1

    44e231227445bd7848d16443256da68cf6700a27

    SHA256

    9ec3009d8249084c87bffdc92e4f52e5484315c17ab4460819d3063d8bca9296

    SHA512

    1d16b0ef03b16e5c3590bcce12b6666439ec92c88cacee284a630b4ed96be8680b81cdbce6cb0d3ca3b20a8a6a5a7d26afac27965b112d9abbdaf143e87d9c87