Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
04/08/2023, 15:05
Static task
static1
Behavioral task
behavioral1
Sample
5983adfaecf149fba527ead75d5458a6_icedid_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
5983adfaecf149fba527ead75d5458a6_icedid_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
5983adfaecf149fba527ead75d5458a6_icedid_JC.exe
-
Size
261KB
-
MD5
5983adfaecf149fba527ead75d5458a6
-
SHA1
26f5b4b83ca7b266ab88a73659e99b84714fd863
-
SHA256
eec7683ec5fbaff148591f05c51908d375bfc63f634e836947635b7ff6ed4a5c
-
SHA512
e4512ff518801cf486b1c992f252dbdbbcd02d1330bb112d117bc1fa500a56834eadd8655039a26604635d23def042dceb660c352e4adcf5bba0424e3205db5a
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1872 Security.exe -
Loads dropped DLL 2 IoCs
pid Process 1240 5983adfaecf149fba527ead75d5458a6_icedid_JC.exe 1240 5983adfaecf149fba527ead75d5458a6_icedid_JC.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Graphics\Security.exe 5983adfaecf149fba527ead75d5458a6_icedid_JC.exe File opened for modification C:\Program Files\Graphics\Security.exe 5983adfaecf149fba527ead75d5458a6_icedid_JC.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1240 5983adfaecf149fba527ead75d5458a6_icedid_JC.exe 1240 5983adfaecf149fba527ead75d5458a6_icedid_JC.exe 1240 5983adfaecf149fba527ead75d5458a6_icedid_JC.exe 1240 5983adfaecf149fba527ead75d5458a6_icedid_JC.exe 1872 Security.exe 1872 Security.exe 1872 Security.exe 1872 Security.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1240 wrote to memory of 1872 1240 5983adfaecf149fba527ead75d5458a6_icedid_JC.exe 28 PID 1240 wrote to memory of 1872 1240 5983adfaecf149fba527ead75d5458a6_icedid_JC.exe 28 PID 1240 wrote to memory of 1872 1240 5983adfaecf149fba527ead75d5458a6_icedid_JC.exe 28 PID 1240 wrote to memory of 1872 1240 5983adfaecf149fba527ead75d5458a6_icedid_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5983adfaecf149fba527ead75d5458a6_icedid_JC.exe"C:\Users\Admin\AppData\Local\Temp\5983adfaecf149fba527ead75d5458a6_icedid_JC.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Program Files\Graphics\Security.exe"C:\Program Files\Graphics\Security.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1872
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
261KB
MD52274efbb362969ee105a63ac9ee41761
SHA1559f5bf425b01d008064704d73956a3a9e56876e
SHA256edb5ef7240c95c20dbfb495b365ecbd234483ebf9f735f2db115daa587972d9a
SHA512d65d006fc40c8efda49817c385a3f184378fb7f47472e076fb2ace97261a53ec2669155960da69e7cc107e10cb4b72caaba82f089b098c596579026cf2b46b7a
-
Filesize
261KB
MD52274efbb362969ee105a63ac9ee41761
SHA1559f5bf425b01d008064704d73956a3a9e56876e
SHA256edb5ef7240c95c20dbfb495b365ecbd234483ebf9f735f2db115daa587972d9a
SHA512d65d006fc40c8efda49817c385a3f184378fb7f47472e076fb2ace97261a53ec2669155960da69e7cc107e10cb4b72caaba82f089b098c596579026cf2b46b7a
-
Filesize
261KB
MD52274efbb362969ee105a63ac9ee41761
SHA1559f5bf425b01d008064704d73956a3a9e56876e
SHA256edb5ef7240c95c20dbfb495b365ecbd234483ebf9f735f2db115daa587972d9a
SHA512d65d006fc40c8efda49817c385a3f184378fb7f47472e076fb2ace97261a53ec2669155960da69e7cc107e10cb4b72caaba82f089b098c596579026cf2b46b7a
-
Filesize
261KB
MD52274efbb362969ee105a63ac9ee41761
SHA1559f5bf425b01d008064704d73956a3a9e56876e
SHA256edb5ef7240c95c20dbfb495b365ecbd234483ebf9f735f2db115daa587972d9a
SHA512d65d006fc40c8efda49817c385a3f184378fb7f47472e076fb2ace97261a53ec2669155960da69e7cc107e10cb4b72caaba82f089b098c596579026cf2b46b7a