Analysis

  • max time kernel
    145s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/04/2024, 21:26

General

  • Target

    2024-04-04_1ed74a641a553abeacfbd4737c2e4ee5_icedid.exe

  • Size

    389KB

  • MD5

    1ed74a641a553abeacfbd4737c2e4ee5

  • SHA1

    7d552f5b9238d87c5fb74a42f1b99bdc3cc412ba

  • SHA256

    0e8484bdcab31231b655059afde2b3f63c1f46b231a464d23326bea3b5c94d5a

  • SHA512

    c841f29459920a985b9538c20fb3c44b736ef23b9b55ffb6eda603e32d0e29fdde753d1fb48a0de98f854662b0264bf5c070ea3e66547345bbc466f75869b5f3

  • SSDEEP

    12288:dplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:/xRQ+Fucuvm0as

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-04_1ed74a641a553abeacfbd4737c2e4ee5_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-04_1ed74a641a553abeacfbd4737c2e4ee5_icedid.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1876
    • C:\Program Files\games\that.exe
      "C:\Program Files\games\that.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2852

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\games\that.exe

    Filesize

    389KB

    MD5

    0630cf62d563dfacec36a7fddcc3a128

    SHA1

    32d5bd2eddd990572b6fa58fd2a24fc030d9bee1

    SHA256

    2b932ad56ed5b648a4fa17473da8435ef0f5e1f2632f86dca24c2b62b463e513

    SHA512

    3eeca3bfb4b8a053ee1f29af72ad7581501d69ec227f0f4f5f971a638ae88cae160ce9d1e0c5c368532a4e9fe20e381c255e75f4b3b95c1c52190910ad7c032b