Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
04/08/2023, 15:04
Static task
static1
Behavioral task
behavioral1
Sample
59602ffb7959206f1ea2600d20cab729_icedid_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
59602ffb7959206f1ea2600d20cab729_icedid_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
59602ffb7959206f1ea2600d20cab729_icedid_JC.exe
-
Size
368KB
-
MD5
59602ffb7959206f1ea2600d20cab729
-
SHA1
6af6d59e84c1ac530763a4b192121e1f4f1df6ea
-
SHA256
128bf2aec466b48495c5a326fbcb5ecac63676b2a8c08407d7a95d914956edc2
-
SHA512
7bafea40b11f9d1ae757702058db7dfd57433ef8194cb920a3fc09d5e3489e108367e8b9c951f61d3c7b5a952438aae4846fe2cc312589675574c2c23f28db00
-
SSDEEP
6144:gplrlbbDdQaqd2X/96fr3KFEUGjr8uB2WgcA0cpXEVNrvGZ4FUqm6:gplrVbDdQaqdS/ofraFErH8uB2Wm0SXj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1040 obtains.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\provided\obtains.exe 59602ffb7959206f1ea2600d20cab729_icedid_JC.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2436 59602ffb7959206f1ea2600d20cab729_icedid_JC.exe 2436 59602ffb7959206f1ea2600d20cab729_icedid_JC.exe 2436 59602ffb7959206f1ea2600d20cab729_icedid_JC.exe 2436 59602ffb7959206f1ea2600d20cab729_icedid_JC.exe 1040 obtains.exe 1040 obtains.exe 1040 obtains.exe 1040 obtains.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2436 wrote to memory of 1040 2436 59602ffb7959206f1ea2600d20cab729_icedid_JC.exe 85 PID 2436 wrote to memory of 1040 2436 59602ffb7959206f1ea2600d20cab729_icedid_JC.exe 85 PID 2436 wrote to memory of 1040 2436 59602ffb7959206f1ea2600d20cab729_icedid_JC.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\59602ffb7959206f1ea2600d20cab729_icedid_JC.exe"C:\Users\Admin\AppData\Local\Temp\59602ffb7959206f1ea2600d20cab729_icedid_JC.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Program Files\provided\obtains.exe"C:\Program Files\provided\obtains.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1040
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
369KB
MD5e2b19b0bfb53f30ab2f2a4270d7fbbc4
SHA1f422e0cf76900b2d7b546975dbd6897d399264bf
SHA2569d8a3e7de79e036b8920a7581df3ef4d371cf855098a9f74117b7af79e52fbea
SHA5129f0e3e4247f9727273c9b8a557be58401ad9c7c4cc2cf00894260b1c42ffe25b09f17bd98f9e84de2279181da3135da4574e716c241371def9fb956296bb8dd4
-
Filesize
369KB
MD5e2b19b0bfb53f30ab2f2a4270d7fbbc4
SHA1f422e0cf76900b2d7b546975dbd6897d399264bf
SHA2569d8a3e7de79e036b8920a7581df3ef4d371cf855098a9f74117b7af79e52fbea
SHA5129f0e3e4247f9727273c9b8a557be58401ad9c7c4cc2cf00894260b1c42ffe25b09f17bd98f9e84de2279181da3135da4574e716c241371def9fb956296bb8dd4