Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    09-09-2024 05:26

General

  • Target

    2024-09-09_1d1095875312991df3e76e0b2cf0793d_hacktools_icedid.exe

  • Size

    12.8MB

  • MD5

    1d1095875312991df3e76e0b2cf0793d

  • SHA1

    576bd92c76b0056740e421730bcfb10b09218935

  • SHA256

    fa7fc6a1c055ec444be333e79ad89f7da937435016f4d3ff08bf2eeeb010e17d

  • SHA512

    8b3dc9497fea556821517e3ca22849ae9e9078116b4b2fb9afe4fa15bef85234a8179c9d0f8126ce061d6c72bbe3af26801513c7a75459e536098397e417374f

  • SSDEEP

    196608:xALSpvFE50ukXRSB1Zi0xScyAOKkK5rS4rOaUJiyi6K/vXtxibzLT9m+IJVlCo:POrHTY9K/vXD+zLTg+IV

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-09_1d1095875312991df3e76e0b2cf0793d_hacktools_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-09_1d1095875312991df3e76e0b2cf0793d_hacktools_icedid.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2084

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\libacf.dll

    Filesize

    3.0MB

    MD5

    717ae0841cf17611cefc59ca6cf8284e

    SHA1

    35d0dd5cacebb5787a07647f8536aa0294ca680d

    SHA256

    9b89bada8584f038c5c6744ea5249d71a5fa6d953a0152dbad21827a969e047d

    SHA512

    4efd5073d287ecea9cc7eed7d42e9b7e927f33d90faebb348651a35ef36d8ed4fb28e0f7dce77082d264cd0070c5a30393814a44d9760905d9279c2fbe164fde

  • \Users\Admin\AppData\Local\Temp\libacf_Caller.dll

    Filesize

    449KB

    MD5

    dc78ab716d4c046e187a0ccacceadc57

    SHA1

    01da2325701d0f5668bf8acbe28c8a7816f1b5c8

    SHA256

    9eb9405da103fe9c13f8d902fb1d6690d13a9a10115cc8e290ade22fa819af85

    SHA512

    0e02df7741f018d5946f783b4fbe62243847cdd6aed628f86a9c6895ca69db417e4dfce7429d8f9dc591ed9fd9b47ed140deb1f96bd8a7a9937c293f3cc8191c

  • memory/2084-20-0x0000000000400000-0x000000000116E000-memory.dmp

    Filesize

    13.4MB

  • memory/2084-11-0x0000000001170000-0x0000000001194000-memory.dmp

    Filesize

    144KB

  • memory/2084-21-0x0000000000400000-0x000000000116E000-memory.dmp

    Filesize

    13.4MB

  • memory/2084-13-0x0000000000400000-0x000000000116E000-memory.dmp

    Filesize

    13.4MB

  • memory/2084-15-0x0000000000400000-0x000000000116E000-memory.dmp

    Filesize

    13.4MB

  • memory/2084-14-0x0000000000400000-0x000000000116E000-memory.dmp

    Filesize

    13.4MB

  • memory/2084-17-0x0000000000400000-0x000000000116E000-memory.dmp

    Filesize

    13.4MB

  • memory/2084-16-0x0000000000400000-0x000000000116E000-memory.dmp

    Filesize

    13.4MB

  • memory/2084-23-0x0000000000400000-0x000000000116E000-memory.dmp

    Filesize

    13.4MB

  • memory/2084-19-0x0000000000400000-0x000000000116E000-memory.dmp

    Filesize

    13.4MB

  • memory/2084-33-0x0000000000400000-0x000000000116E000-memory.dmp

    Filesize

    13.4MB

  • memory/2084-12-0x0000000000320000-0x0000000000321000-memory.dmp

    Filesize

    4KB

  • memory/2084-18-0x0000000000400000-0x000000000116E000-memory.dmp

    Filesize

    13.4MB

  • memory/2084-22-0x0000000000400000-0x000000000116E000-memory.dmp

    Filesize

    13.4MB

  • memory/2084-24-0x0000000000400000-0x000000000116E000-memory.dmp

    Filesize

    13.4MB

  • memory/2084-25-0x0000000000400000-0x000000000116E000-memory.dmp

    Filesize

    13.4MB

  • memory/2084-27-0x0000000000400000-0x000000000116E000-memory.dmp

    Filesize

    13.4MB

  • memory/2084-28-0x0000000000400000-0x000000000116E000-memory.dmp

    Filesize

    13.4MB

  • memory/2084-26-0x0000000000400000-0x000000000116E000-memory.dmp

    Filesize

    13.4MB

  • memory/2084-29-0x0000000000400000-0x000000000116E000-memory.dmp

    Filesize

    13.4MB

  • memory/2084-30-0x0000000000400000-0x000000000116E000-memory.dmp

    Filesize

    13.4MB

  • memory/2084-9-0x00000000004EA000-0x00000000004EB000-memory.dmp

    Filesize

    4KB