Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    23/04/2024, 23:23

General

  • Target

    2024-04-23_2028be682c5facb54b7a895c63f63da3_icedid.exe

  • Size

    276KB

  • MD5

    2028be682c5facb54b7a895c63f63da3

  • SHA1

    50fb086d445139a99d7931fe0df235b632ac442b

  • SHA256

    e129280f165e539f639de10804102cc54f486d3b0c15cb9f64a2496f7be88df3

  • SHA512

    670303a40919b32bc92c755811c276331bf77828dc693c8a4237d81a6b553bb60d6255a50fafe7e8f281f887a60d2173cb111e8e2688838268016eb683dde304

  • SSDEEP

    3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-23_2028be682c5facb54b7a895c63f63da3_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-23_2028be682c5facb54b7a895c63f63da3_icedid.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2308
    • C:\Program Files\callback\customizing.exe
      "C:\Program Files\callback\customizing.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:852

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Program Files\callback\customizing.exe

          Filesize

          276KB

          MD5

          9c4715c45c9c9d9cc6acf8cc51b9f79c

          SHA1

          f2c465b2f299e40ef578ce7f9bed77a964139ff5

          SHA256

          7301e639c89086692696a394ecf8845b9b17e8b74883cd80b3cfc29d6dd3e94d

          SHA512

          f13f63eb2770fd682123d515a3b3be894440659446a84205055f2e4915b43c20f3e375cdb4afad5e251b087b53a5206ace53f58f0cd60e45361a08f3c9505adf