Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
05/07/2024, 22:17
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-07-05_c26bb1390c60e8278dcaec3f2a0599af_icedid_nymaim.exe
Resource
win7-20240705-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-07-05_c26bb1390c60e8278dcaec3f2a0599af_icedid_nymaim.exe
Resource
win10v2004-20240704-en
2 signatures
150 seconds
General
-
Target
2024-07-05_c26bb1390c60e8278dcaec3f2a0599af_icedid_nymaim.exe
-
Size
668KB
-
MD5
c26bb1390c60e8278dcaec3f2a0599af
-
SHA1
65d9b339536cd37d57f00336ccb1f36ce049918b
-
SHA256
e1434cc9a082aaecdecaf2823ec26507522b3279c88930f15d6a228524b76d52
-
SHA512
43648ed2d11dcc5a0576d60d76b253646873278744d3496bcc616418b5e7a5878796cae81f228214f15e293ade5569c0eb129ede6f06013f4854543bb4b6dbf8
-
SSDEEP
12288:P+SvIx8wRDBybSIAKpHMdj5yKtN5fkKZVF7+rGq:rIxNBybSoShDB
Score
1/10
Malware Config
Signatures
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\dwifile\shell\open\command 2024-07-05_c26bb1390c60e8278dcaec3f2a0599af_icedid_nymaim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\dwifile 2024-07-05_c26bb1390c60e8278dcaec3f2a0599af_icedid_nymaim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\dwifile\shell\open 2024-07-05_c26bb1390c60e8278dcaec3f2a0599af_icedid_nymaim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\dwifile\shell\open\ddeexec 2024-07-05_c26bb1390c60e8278dcaec3f2a0599af_icedid_nymaim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.dwi 2024-07-05_c26bb1390c60e8278dcaec3f2a0599af_icedid_nymaim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.dwi\ = "dwifile" 2024-07-05_c26bb1390c60e8278dcaec3f2a0599af_icedid_nymaim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\dwifile\shell 2024-07-05_c26bb1390c60e8278dcaec3f2a0599af_icedid_nymaim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\dwifile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2024-0~1.EXE /dde" 2024-07-05_c26bb1390c60e8278dcaec3f2a0599af_icedid_nymaim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\dwifile\shell\open\ddeexec\ = "[open(\"%1\")]" 2024-07-05_c26bb1390c60e8278dcaec3f2a0599af_icedid_nymaim.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2368 2024-07-05_c26bb1390c60e8278dcaec3f2a0599af_icedid_nymaim.exe 2368 2024-07-05_c26bb1390c60e8278dcaec3f2a0599af_icedid_nymaim.exe