Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
03-08-2023 16:51
Static task
static1
Behavioral task
behavioral1
Sample
4f41a7efc0d8d5836c9131487b0960e7_icedid_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
4f41a7efc0d8d5836c9131487b0960e7_icedid_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
4f41a7efc0d8d5836c9131487b0960e7_icedid_JC.exe
-
Size
369KB
-
MD5
4f41a7efc0d8d5836c9131487b0960e7
-
SHA1
0281216f915641ce9fb0cdbcd2459e094c2126fb
-
SHA256
72c06da541d585722a9aca1ae64bb87faa2d392782383a3f58f9a292ba4df28b
-
SHA512
94296fee4284b62b85e7f9c86bbc1fa4de634496c2b97c788d41c8fcfb7504b6ee304cfeda2a8f23aff49ff19f2c0d11434c37f423352ce34fb3b940bf7c60ea
-
SSDEEP
6144:GplrlbbDdQaqd2X/96fr3KFEUGjr8uB2WgcA0cpXEVNrvGZ4FUqm6:GplrVbDdQaqdS/ofraFErH8uB2Wm0SXj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2576 novice.exe -
Loads dropped DLL 2 IoCs
pid Process 2168 4f41a7efc0d8d5836c9131487b0960e7_icedid_JC.exe 2168 4f41a7efc0d8d5836c9131487b0960e7_icedid_JC.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\status\novice.exe 4f41a7efc0d8d5836c9131487b0960e7_icedid_JC.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2168 4f41a7efc0d8d5836c9131487b0960e7_icedid_JC.exe 2168 4f41a7efc0d8d5836c9131487b0960e7_icedid_JC.exe 2168 4f41a7efc0d8d5836c9131487b0960e7_icedid_JC.exe 2168 4f41a7efc0d8d5836c9131487b0960e7_icedid_JC.exe 2576 novice.exe 2576 novice.exe 2576 novice.exe 2576 novice.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2576 2168 4f41a7efc0d8d5836c9131487b0960e7_icedid_JC.exe 28 PID 2168 wrote to memory of 2576 2168 4f41a7efc0d8d5836c9131487b0960e7_icedid_JC.exe 28 PID 2168 wrote to memory of 2576 2168 4f41a7efc0d8d5836c9131487b0960e7_icedid_JC.exe 28 PID 2168 wrote to memory of 2576 2168 4f41a7efc0d8d5836c9131487b0960e7_icedid_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f41a7efc0d8d5836c9131487b0960e7_icedid_JC.exe"C:\Users\Admin\AppData\Local\Temp\4f41a7efc0d8d5836c9131487b0960e7_icedid_JC.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files\status\novice.exe"C:\Program Files\status\novice.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2576
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
369KB
MD5c28e3b3572d9adbe9e726b2a6957e33d
SHA16d1f0af0469e5089a7920476023fd4e82ae42006
SHA2566a675142a1a5066d8621146ca715e03688f76286088391a1c6b2ac7f7f16ce23
SHA5128488be4bbe1c23089269e60f5390f839824d35aa9b7616498f145d84d6724452cc41770c555a3e6429a6f8304aac05377566482bb9ef7172edcd49ab9c17f376
-
Filesize
369KB
MD5c28e3b3572d9adbe9e726b2a6957e33d
SHA16d1f0af0469e5089a7920476023fd4e82ae42006
SHA2566a675142a1a5066d8621146ca715e03688f76286088391a1c6b2ac7f7f16ce23
SHA5128488be4bbe1c23089269e60f5390f839824d35aa9b7616498f145d84d6724452cc41770c555a3e6429a6f8304aac05377566482bb9ef7172edcd49ab9c17f376
-
Filesize
369KB
MD5c28e3b3572d9adbe9e726b2a6957e33d
SHA16d1f0af0469e5089a7920476023fd4e82ae42006
SHA2566a675142a1a5066d8621146ca715e03688f76286088391a1c6b2ac7f7f16ce23
SHA5128488be4bbe1c23089269e60f5390f839824d35aa9b7616498f145d84d6724452cc41770c555a3e6429a6f8304aac05377566482bb9ef7172edcd49ab9c17f376
-
Filesize
369KB
MD5c28e3b3572d9adbe9e726b2a6957e33d
SHA16d1f0af0469e5089a7920476023fd4e82ae42006
SHA2566a675142a1a5066d8621146ca715e03688f76286088391a1c6b2ac7f7f16ce23
SHA5128488be4bbe1c23089269e60f5390f839824d35aa9b7616498f145d84d6724452cc41770c555a3e6429a6f8304aac05377566482bb9ef7172edcd49ab9c17f376