Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 03:51

General

  • Target

    2024-05-25_7a8ae4294cf2d6f9c2b1f958155e8e0c_icedid.exe

  • Size

    304KB

  • MD5

    7a8ae4294cf2d6f9c2b1f958155e8e0c

  • SHA1

    83ba8c49de4478cd013aebb37e68eb4a61447257

  • SHA256

    c3e189c9e0eccb5c973e6b2e37feebc70e65b6aa7f6e92febe94b7f4ddc01db0

  • SHA512

    bf4f4c3a4f86e241e1deaf23158642d0431f8a1a2f9f1b352608eb37b0b4f73621fb0f178fe635f0c7e2a51f314406692feef6e40361a5ff9d6b7b981ae9cfed

  • SSDEEP

    6144:IrOy6ow9NQnkGNbcncWowjLqY7jU40xgVwi:IrOYnkGGtLqY7jU4xw

Malware Config

Extracted

Family

icedid

Botnet

4031737906

C2

fishofgloster.pw

newwildtuna.top

Attributes
  • auth_var

    3

  • url_path

    /audio/

Extracted

Family

icedid

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • IcedID Second Stage Loader 2 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-25_7a8ae4294cf2d6f9c2b1f958155e8e0c_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-25_7a8ae4294cf2d6f9c2b1f958155e8e0c_icedid.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    PID:2220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2220-3-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

  • memory/2220-7-0x0000000000270000-0x0000000000273000-memory.dmp

    Filesize

    12KB