Analysis
-
max time kernel
139s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-06-2024 20:42
Behavioral task
behavioral1
Sample
2024-06-27_68c74be597f0a523c47cde04d8ea2be1_icedid.exe
Resource
win7-20240508-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-06-27_68c74be597f0a523c47cde04d8ea2be1_icedid.exe
Resource
win10v2004-20240226-en
3 signatures
150 seconds
General
-
Target
2024-06-27_68c74be597f0a523c47cde04d8ea2be1_icedid.exe
-
Size
22.2MB
-
MD5
68c74be597f0a523c47cde04d8ea2be1
-
SHA1
25821cd68907ddb55d22c96657cfafa0ea046bde
-
SHA256
8601c17ad8aa70b18b76589a424359a7409364249cadc582169a1d70509f13dc
-
SHA512
58d330ef8ecc94dce9720c52affd02be67647a345c5e1336c85caa9b21f6b8ba3044d71fb9ad0713906e401c68f33c75876fd971f3394c53f3bd6fcf1ea3dced
-
SSDEEP
393216:wU3jCE+e1d9ai/HNLeoeYjRskDR81WPcsXwfXuUYgH6/B:wU3FtH4II+DOgcsXwWRgH6p
Score
9/10
Malware Config
Signatures
-
Detects executables packed with Enigma 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3328-0-0x0000000000400000-0x0000000000500000-memory.dmp INDICATOR_EXE_Packed_Enigma behavioral2/memory/3328-3-0x0000000000400000-0x0000000000500000-memory.dmp INDICATOR_EXE_Packed_Enigma -
Detects packed executables observed in Molerats 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3328-0-0x0000000000400000-0x0000000000500000-memory.dmp INDICATOR_EXE_Packed_Loader behavioral2/memory/3328-3-0x0000000000400000-0x0000000000500000-memory.dmp INDICATOR_EXE_Packed_Loader -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
2024-06-27_68c74be597f0a523c47cde04d8ea2be1_icedid.exepid process 3328 2024-06-27_68c74be597f0a523c47cde04d8ea2be1_icedid.exe 3328 2024-06-27_68c74be597f0a523c47cde04d8ea2be1_icedid.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_68c74be597f0a523c47cde04d8ea2be1_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-27_68c74be597f0a523c47cde04d8ea2be1_icedid.exe"1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1408 --field-trial-handle=2276,i,5697607538120380977,9987005253899555344,262144 --variations-seed-version /prefetch:81⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3328-0-0x0000000000400000-0x0000000000500000-memory.dmpFilesize
1024KB
-
memory/3328-1-0x0000000077AF2000-0x0000000077AF3000-memory.dmpFilesize
4KB
-
memory/3328-2-0x0000000077AF3000-0x0000000077AF4000-memory.dmpFilesize
4KB
-
memory/3328-3-0x0000000000400000-0x0000000000500000-memory.dmpFilesize
1024KB