Analysis

  • max time kernel
    147s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/04/2024, 00:29

General

  • Target

    2024-04-10_3171e631cc09334dca483e0b564eef4c_icedid.exe

  • Size

    419KB

  • MD5

    3171e631cc09334dca483e0b564eef4c

  • SHA1

    ca5fe0cbce816cfb69a986cc9764d86396570dca

  • SHA256

    d97d74e2f90ea1f336210dc1aeeb82690d11f6d5bab35eb9876039960d62fd21

  • SHA512

    fec2bfb3ec6dfc06c8f3cd27cc4b82e4fbc50674d4fe6ac68475a7abfc25c90531a20e1974004ac9f7e44cb6ca62c74a879df310f2f268b29b4ee902c953153e

  • SSDEEP

    12288:TplrVbDdQaqdS/KfraFErH8uB2Wm0SX/Nr5FU:VxRW+Fucuvm0a/

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-10_3171e631cc09334dca483e0b564eef4c_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-10_3171e631cc09334dca483e0b564eef4c_icedid.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3816
    • C:\Program Files\Chinese\Traditional.exe
      "C:\Program Files\Chinese\Traditional.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3640

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\Chinese\Traditional.exe

          Filesize

          419KB

          MD5

          551777766ea0a8538af55d0e8638936c

          SHA1

          4b8bbfd231e74e3117675d2a82329bee0584332e

          SHA256

          f6d6abd938038a61a5921c3724910b83868f7cf99f9dfcdbc642acfadd5ceddd

          SHA512

          3711ca8f389831bc119e1a2cbe8b7c25e6bf92de7535af8c9238cb4cb9dafb410a6ddfc49abab7db53b9a216b9c45046acddfeef38b67f89462cc0ab09b810bc

        • memory/3640-6-0x0000000000400000-0x0000000000573000-memory.dmp

          Filesize

          1.4MB

        • memory/3640-7-0x0000000000400000-0x0000000000573000-memory.dmp

          Filesize

          1.4MB

        • memory/3816-0-0x0000000000400000-0x0000000000573000-memory.dmp

          Filesize

          1.4MB

        • memory/3816-5-0x0000000000400000-0x0000000000573000-memory.dmp

          Filesize

          1.4MB