Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    27/07/2024, 11:26

General

  • Target

    2024-07-27_d2dfb20fed3286b56f81fae40c30485b_bkransomware_icedid.exe

  • Size

    1020KB

  • MD5

    d2dfb20fed3286b56f81fae40c30485b

  • SHA1

    eafe85752f158feca8c90883c0cd02fe32e50ec5

  • SHA256

    2b30269ae391716e71b651b631ce6889094c9bb2658cbcc46370251e85c4d9d6

  • SHA512

    4fdb2eaf95c13185b82677efb255be5b7a1907ce9bf39d345885dbfdf8fbebeda11e7fd94b46e79b0ae60a2084023ba19f9f1b731b02be4a2eafd308b61a39bf

  • SSDEEP

    12288:mOSMJYN6wD7otUx7rYbS1ln3JtqALgxN3ht/U/IPTllloGaFaPfMlHI2gr8E:mOSWYN6wD7otsTznZkAixPjlyFaJ2B

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-07-27_d2dfb20fed3286b56f81fae40c30485b_bkransomware_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-07-27_d2dfb20fed3286b56f81fae40c30485b_bkransomware_icedid.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2320
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2320 -s 216
      2⤵
      • Program crash
      PID:2556

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads