Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
04/08/2023, 15:04
Static task
static1
Behavioral task
behavioral1
Sample
59602ffb7959206f1ea2600d20cab729_icedid_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
59602ffb7959206f1ea2600d20cab729_icedid_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
59602ffb7959206f1ea2600d20cab729_icedid_JC.exe
-
Size
368KB
-
MD5
59602ffb7959206f1ea2600d20cab729
-
SHA1
6af6d59e84c1ac530763a4b192121e1f4f1df6ea
-
SHA256
128bf2aec466b48495c5a326fbcb5ecac63676b2a8c08407d7a95d914956edc2
-
SHA512
7bafea40b11f9d1ae757702058db7dfd57433ef8194cb920a3fc09d5e3489e108367e8b9c951f61d3c7b5a952438aae4846fe2cc312589675574c2c23f28db00
-
SSDEEP
6144:gplrlbbDdQaqd2X/96fr3KFEUGjr8uB2WgcA0cpXEVNrvGZ4FUqm6:gplrVbDdQaqdS/ofraFErH8uB2Wm0SXj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2592 provided.exe -
Loads dropped DLL 2 IoCs
pid Process 1196 59602ffb7959206f1ea2600d20cab729_icedid_JC.exe 1196 59602ffb7959206f1ea2600d20cab729_icedid_JC.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\audience\provided.exe 59602ffb7959206f1ea2600d20cab729_icedid_JC.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1196 59602ffb7959206f1ea2600d20cab729_icedid_JC.exe 1196 59602ffb7959206f1ea2600d20cab729_icedid_JC.exe 1196 59602ffb7959206f1ea2600d20cab729_icedid_JC.exe 1196 59602ffb7959206f1ea2600d20cab729_icedid_JC.exe 2592 provided.exe 2592 provided.exe 2592 provided.exe 2592 provided.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1196 wrote to memory of 2592 1196 59602ffb7959206f1ea2600d20cab729_icedid_JC.exe 28 PID 1196 wrote to memory of 2592 1196 59602ffb7959206f1ea2600d20cab729_icedid_JC.exe 28 PID 1196 wrote to memory of 2592 1196 59602ffb7959206f1ea2600d20cab729_icedid_JC.exe 28 PID 1196 wrote to memory of 2592 1196 59602ffb7959206f1ea2600d20cab729_icedid_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\59602ffb7959206f1ea2600d20cab729_icedid_JC.exe"C:\Users\Admin\AppData\Local\Temp\59602ffb7959206f1ea2600d20cab729_icedid_JC.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Program Files\audience\provided.exe"C:\Program Files\audience\provided.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2592
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
369KB
MD5be66810ebe88f3bc7d7d7a0b0b540fc5
SHA109a3b90a73880331f980e67b43f4ec0127e9ee18
SHA2564842a199267fe9242e123a61cfa2c4587fff45c1808dfad69598d3cd169b8fcd
SHA51293f12ee5d1229ad2fa28819b0f0ddf976dc94fbc59a37bcf61a28534ad0271f2bb3cec28ee428b030a252a94dbc4a2e4e8e3c30a075f2795c031cbfd5f292b42
-
Filesize
369KB
MD5be66810ebe88f3bc7d7d7a0b0b540fc5
SHA109a3b90a73880331f980e67b43f4ec0127e9ee18
SHA2564842a199267fe9242e123a61cfa2c4587fff45c1808dfad69598d3cd169b8fcd
SHA51293f12ee5d1229ad2fa28819b0f0ddf976dc94fbc59a37bcf61a28534ad0271f2bb3cec28ee428b030a252a94dbc4a2e4e8e3c30a075f2795c031cbfd5f292b42
-
Filesize
369KB
MD5be66810ebe88f3bc7d7d7a0b0b540fc5
SHA109a3b90a73880331f980e67b43f4ec0127e9ee18
SHA2564842a199267fe9242e123a61cfa2c4587fff45c1808dfad69598d3cd169b8fcd
SHA51293f12ee5d1229ad2fa28819b0f0ddf976dc94fbc59a37bcf61a28534ad0271f2bb3cec28ee428b030a252a94dbc4a2e4e8e3c30a075f2795c031cbfd5f292b42
-
Filesize
369KB
MD5be66810ebe88f3bc7d7d7a0b0b540fc5
SHA109a3b90a73880331f980e67b43f4ec0127e9ee18
SHA2564842a199267fe9242e123a61cfa2c4587fff45c1808dfad69598d3cd169b8fcd
SHA51293f12ee5d1229ad2fa28819b0f0ddf976dc94fbc59a37bcf61a28534ad0271f2bb3cec28ee428b030a252a94dbc4a2e4e8e3c30a075f2795c031cbfd5f292b42