Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10/04/2024, 00:29

General

  • Target

    2024-04-10_3171e631cc09334dca483e0b564eef4c_icedid.exe

  • Size

    419KB

  • MD5

    3171e631cc09334dca483e0b564eef4c

  • SHA1

    ca5fe0cbce816cfb69a986cc9764d86396570dca

  • SHA256

    d97d74e2f90ea1f336210dc1aeeb82690d11f6d5bab35eb9876039960d62fd21

  • SHA512

    fec2bfb3ec6dfc06c8f3cd27cc4b82e4fbc50674d4fe6ac68475a7abfc25c90531a20e1974004ac9f7e44cb6ca62c74a879df310f2f268b29b4ee902c953153e

  • SSDEEP

    12288:TplrVbDdQaqdS/KfraFErH8uB2Wm0SX/Nr5FU:VxRW+Fucuvm0a/

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-10_3171e631cc09334dca483e0b564eef4c_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-10_3171e631cc09334dca483e0b564eef4c_icedid.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Program Files\supports\languages.exe
      "C:\Program Files\supports\languages.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2080

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Program Files\supports\languages.exe

          Filesize

          419KB

          MD5

          2deb125086b8210a1da7337888f1bc7e

          SHA1

          6efb2798ad91f5e99c12005362f0c768490d6640

          SHA256

          3a91ca95c6aa28d512d604c2c31a3f04ba83f61d9057257af3eb8bfacb4bd9e9

          SHA512

          5fdfecd88438cfad587b480c33c47b603d6175853e36fa7de80f3e977734cf2b5e1fdb0cd6f8db9ef467aae14a45ff5e2483d00c0c528a1e783f443487278a0e

        • memory/2020-0-0x0000000000400000-0x0000000000573000-memory.dmp

          Filesize

          1.4MB

        • memory/2020-9-0x0000000002590000-0x0000000002703000-memory.dmp

          Filesize

          1.4MB

        • memory/2020-11-0x0000000000400000-0x0000000000573000-memory.dmp

          Filesize

          1.4MB

        • memory/2080-10-0x0000000000400000-0x0000000000573000-memory.dmp

          Filesize

          1.4MB

        • memory/2080-12-0x0000000000400000-0x0000000000573000-memory.dmp

          Filesize

          1.4MB