Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27-06-2024 20:42
Behavioral task
behavioral1
Sample
2024-06-27_68c74be597f0a523c47cde04d8ea2be1_icedid.exe
Resource
win7-20240508-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-06-27_68c74be597f0a523c47cde04d8ea2be1_icedid.exe
Resource
win10v2004-20240226-en
3 signatures
150 seconds
General
-
Target
2024-06-27_68c74be597f0a523c47cde04d8ea2be1_icedid.exe
-
Size
22.2MB
-
MD5
68c74be597f0a523c47cde04d8ea2be1
-
SHA1
25821cd68907ddb55d22c96657cfafa0ea046bde
-
SHA256
8601c17ad8aa70b18b76589a424359a7409364249cadc582169a1d70509f13dc
-
SHA512
58d330ef8ecc94dce9720c52affd02be67647a345c5e1336c85caa9b21f6b8ba3044d71fb9ad0713906e401c68f33c75876fd971f3394c53f3bd6fcf1ea3dced
-
SSDEEP
393216:wU3jCE+e1d9ai/HNLeoeYjRskDR81WPcsXwfXuUYgH6/B:wU3FtH4II+DOgcsXwWRgH6p
Score
9/10
Malware Config
Signatures
-
Detects executables packed with Enigma 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1684-0-0x0000000000400000-0x0000000000500000-memory.dmp INDICATOR_EXE_Packed_Enigma behavioral1/memory/1684-2-0x0000000000400000-0x0000000000500000-memory.dmp INDICATOR_EXE_Packed_Enigma -
Detects packed executables observed in Molerats 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1684-0-0x0000000000400000-0x0000000000500000-memory.dmp INDICATOR_EXE_Packed_Loader behavioral1/memory/1684-2-0x0000000000400000-0x0000000000500000-memory.dmp INDICATOR_EXE_Packed_Loader -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
2024-06-27_68c74be597f0a523c47cde04d8ea2be1_icedid.exepid process 1684 2024-06-27_68c74be597f0a523c47cde04d8ea2be1_icedid.exe 1684 2024-06-27_68c74be597f0a523c47cde04d8ea2be1_icedid.exe