Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02-09-2024 23:26

General

  • Target

    2024-09-02_20a76fa87be38a19c1d9e3c016006852_icedid.exe

  • Size

    22.3MB

  • MD5

    20a76fa87be38a19c1d9e3c016006852

  • SHA1

    5c0587f461496631a7cde9093e2c0753a56a1685

  • SHA256

    c28461f20cec02e9c32e5f916d6a691a052e8ebb01528ab381dc3f56198c86e6

  • SHA512

    82c4a0b42a89cd252ad83dda91cdbffafacc3eb07ac9a39e3e70e5b59310420d1f29e9bec35c862ae9742664853a922edb3e28928e8a90ea3d410d3d89c68c45

  • SSDEEP

    196608:wpfDuPhas3TehREvExspfDuPhas3TehREvEx/DV1:EfMccT7vESfMccT7vEZf

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-02_20a76fa87be38a19c1d9e3c016006852_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-02_20a76fa87be38a19c1d9e3c016006852_icedid.exe"
    1⤵
    • Drops file in Drivers directory
    • Adds Run key to start application
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\Uninstall.exe

    Filesize

    22.3MB

    MD5

    ff7c61042876dbe76fcd598b808ec95f

    SHA1

    d2e39479f8c9ef06493d00106134480dd04a816d

    SHA256

    dc200cd7407d22dbd25da3373539b97374146d2fd847042cbb4c433279745f10

    SHA512

    9ccc03cc386afd3f02d881dd5c8f2aafd212bf1c95dcc0accc34e33c8b1bec3d5e52465b8a07e9b59372542c2dd249265f7b5a2951c8084de8cca05f7d42b179