Analysis

  • max time kernel
    143s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-04-2024 13:36

General

  • Target

    2024-04-22_fb60c9a89bb0869d35bde2ab55ac918c_icedid.exe

  • Size

    391KB

  • MD5

    fb60c9a89bb0869d35bde2ab55ac918c

  • SHA1

    af8a4a55b8df090c4f9e17764e7dc0d87f5cd1ea

  • SHA256

    daa95576d13d3929139d9d49637ac0cc53938eb24580785fd61eb5f9a1d2ec49

  • SHA512

    cddebe529adb7ff2ad4fcf957239d6f757f013eed0a52d7413525817102be305f244e828113f5218c6459b8d3e37902a0b54bbc3b6c5f29b4f4a31be5917f843

  • SSDEEP

    12288:RplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:jxRQ+Fucuvm0as

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-22_fb60c9a89bb0869d35bde2ab55ac918c_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-22_fb60c9a89bb0869d35bde2ab55ac918c_icedid.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4420
    • C:\Program Files\agreements\within.exe
      "C:\Program Files\agreements\within.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1908

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\agreements\within.exe

    Filesize

    391KB

    MD5

    c6d09cadaec1a73d543359a0e81ad028

    SHA1

    c86bac69d858581454aac79ff3d8b2cbf838a7b4

    SHA256

    5e7c11d07d56dc1bec3bfc10b7c7a20ba3b76d690ce11f5800ac8fd488600814

    SHA512

    0ab5a3448dab6f7b8a0ef3c5372c066169effb50234f31abd05e3a0d8179d4e250094c685c00d77cd413c65a6118d5f86189b02743212846973cf781aee900bb