Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240319-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-04-2024 12:01

General

  • Target

    2024-04-05_8e868fbed80aef4b06c5d38803efbbdf_icedid.exe

  • Size

    315KB

  • MD5

    8e868fbed80aef4b06c5d38803efbbdf

  • SHA1

    4b199147b54f807bfedf3d254ddd569eedc8f4fb

  • SHA256

    e630cced4838dcdf2774176a1e1e3089fe6b821c149ba94e51783e346ee4f8bc

  • SHA512

    2032b09cc925911e6bb24d4abce198592d059313c1b17a5c4b5b8ce88f2051be36106558b764407bd9fa1acd608068a942300b8a200dcb726f453429288b26e2

  • SSDEEP

    3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-05_8e868fbed80aef4b06c5d38803efbbdf_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-05_8e868fbed80aef4b06c5d38803efbbdf_icedid.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4276
    • C:\Program Files\meter\requires.exe
      "C:\Program Files\meter\requires.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2104
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3968 --field-trial-handle=2232,i,10468259530860544675,2192522633371581869,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4956

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\meter\requires.exe

      Filesize

      315KB

      MD5

      673eedb919233a38ad260cab5a1f4e67

      SHA1

      dbbe5c34d1f01d0f9b5eebbc77e329145fc93f09

      SHA256

      f6de66155dd1128ee71787f36844eefa929ae849be98a8736411b136715c1ddb

      SHA512

      e5eeccb681e3ad55e14d9ced10180a12e0cd0c96f92b02b39f4a6658660299ac5210eb8fdbdfd9edd3115bbb5dddb4173cca30ca70d442b2ebd4a55f87cbafae