Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
05-08-2023 11:22
Static task
static1
Behavioral task
behavioral1
Sample
6d5dcfe091ffd62ef24b73d70dc60864_icedid_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
6d5dcfe091ffd62ef24b73d70dc60864_icedid_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
6d5dcfe091ffd62ef24b73d70dc60864_icedid_JC.exe
-
Size
262KB
-
MD5
6d5dcfe091ffd62ef24b73d70dc60864
-
SHA1
060eab3fae8d40d5998957523bfcc57fb2cdd936
-
SHA256
eab40e432dee57a490e2e436b9397a213bd897919091e5ce9202a27983d8e68b
-
SHA512
8cf3e3a6107aa275785be6c364ba2e47d5c3364525f7f8ccf0cace6d1a012594a7f39e22634b85a824b5d34f23072c43c6a9fd2918be452e282be4738216c1a2
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1288 Swedish.exe -
Loads dropped DLL 2 IoCs
pid Process 1704 6d5dcfe091ffd62ef24b73d70dc60864_icedid_JC.exe 1704 6d5dcfe091ffd62ef24b73d70dc60864_icedid_JC.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Spanish\Swedish.exe 6d5dcfe091ffd62ef24b73d70dc60864_icedid_JC.exe File opened for modification C:\Program Files\Spanish\Swedish.exe 6d5dcfe091ffd62ef24b73d70dc60864_icedid_JC.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1704 6d5dcfe091ffd62ef24b73d70dc60864_icedid_JC.exe 1704 6d5dcfe091ffd62ef24b73d70dc60864_icedid_JC.exe 1704 6d5dcfe091ffd62ef24b73d70dc60864_icedid_JC.exe 1704 6d5dcfe091ffd62ef24b73d70dc60864_icedid_JC.exe 1288 Swedish.exe 1288 Swedish.exe 1288 Swedish.exe 1288 Swedish.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1704 wrote to memory of 1288 1704 6d5dcfe091ffd62ef24b73d70dc60864_icedid_JC.exe 30 PID 1704 wrote to memory of 1288 1704 6d5dcfe091ffd62ef24b73d70dc60864_icedid_JC.exe 30 PID 1704 wrote to memory of 1288 1704 6d5dcfe091ffd62ef24b73d70dc60864_icedid_JC.exe 30 PID 1704 wrote to memory of 1288 1704 6d5dcfe091ffd62ef24b73d70dc60864_icedid_JC.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d5dcfe091ffd62ef24b73d70dc60864_icedid_JC.exe"C:\Users\Admin\AppData\Local\Temp\6d5dcfe091ffd62ef24b73d70dc60864_icedid_JC.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Program Files\Spanish\Swedish.exe"C:\Program Files\Spanish\Swedish.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1288
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD5f8d24e15339eb5d84381c83116b79192
SHA1997f86f1730254e83f287a226328e6b3da6bec70
SHA256c8186d8e14287c44e043e667a3608a510f3f5176726e924d471318348f3df2b9
SHA512942af7ea00b4e4324859ebbfcce670ad63e35d3a796d88f199b8c3f2d1ecc4889e6be7a4265554ac09084237bba525bdbabbed92d95ec444011b16f7f903df65
-
Filesize
262KB
MD5f8d24e15339eb5d84381c83116b79192
SHA1997f86f1730254e83f287a226328e6b3da6bec70
SHA256c8186d8e14287c44e043e667a3608a510f3f5176726e924d471318348f3df2b9
SHA512942af7ea00b4e4324859ebbfcce670ad63e35d3a796d88f199b8c3f2d1ecc4889e6be7a4265554ac09084237bba525bdbabbed92d95ec444011b16f7f903df65
-
Filesize
262KB
MD5f8d24e15339eb5d84381c83116b79192
SHA1997f86f1730254e83f287a226328e6b3da6bec70
SHA256c8186d8e14287c44e043e667a3608a510f3f5176726e924d471318348f3df2b9
SHA512942af7ea00b4e4324859ebbfcce670ad63e35d3a796d88f199b8c3f2d1ecc4889e6be7a4265554ac09084237bba525bdbabbed92d95ec444011b16f7f903df65
-
Filesize
262KB
MD5f8d24e15339eb5d84381c83116b79192
SHA1997f86f1730254e83f287a226328e6b3da6bec70
SHA256c8186d8e14287c44e043e667a3608a510f3f5176726e924d471318348f3df2b9
SHA512942af7ea00b4e4324859ebbfcce670ad63e35d3a796d88f199b8c3f2d1ecc4889e6be7a4265554ac09084237bba525bdbabbed92d95ec444011b16f7f903df65