Analysis
-
max time kernel
91s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
05/08/2023, 11:31
Static task
static1
Behavioral task
behavioral1
Sample
6e3fe59504e22255bcde737b42f85dd7_icedid_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
6e3fe59504e22255bcde737b42f85dd7_icedid_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
6e3fe59504e22255bcde737b42f85dd7_icedid_JC.exe
-
Size
405KB
-
MD5
6e3fe59504e22255bcde737b42f85dd7
-
SHA1
5144093483330fd7c220261017bf1a065e979128
-
SHA256
8fbe3929f9352af62e2bbec99d8f928c9481621d45cb3ca287bd0cb68933110c
-
SHA512
6097515fb833378f6295edf07c6c052b36057ca4097753e0461d144b0a3f51d0a919c326344ca1564ddc4386c52ccde345b0bf91ece5f7be85c27bd7b2aa6ee3
-
SSDEEP
12288:PplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:hxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1752 silently.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\choices\silently.exe 6e3fe59504e22255bcde737b42f85dd7_icedid_JC.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3344 6e3fe59504e22255bcde737b42f85dd7_icedid_JC.exe 3344 6e3fe59504e22255bcde737b42f85dd7_icedid_JC.exe 3344 6e3fe59504e22255bcde737b42f85dd7_icedid_JC.exe 3344 6e3fe59504e22255bcde737b42f85dd7_icedid_JC.exe 1752 silently.exe 1752 silently.exe 1752 silently.exe 1752 silently.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3344 wrote to memory of 1752 3344 6e3fe59504e22255bcde737b42f85dd7_icedid_JC.exe 82 PID 3344 wrote to memory of 1752 3344 6e3fe59504e22255bcde737b42f85dd7_icedid_JC.exe 82 PID 3344 wrote to memory of 1752 3344 6e3fe59504e22255bcde737b42f85dd7_icedid_JC.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e3fe59504e22255bcde737b42f85dd7_icedid_JC.exe"C:\Users\Admin\AppData\Local\Temp\6e3fe59504e22255bcde737b42f85dd7_icedid_JC.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Program Files\choices\silently.exe"C:\Program Files\choices\silently.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1752
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
405KB
MD578b632e2170019348852e20b009b194a
SHA1f62df67d26cadc2c3ce81ac3b212022975d9478a
SHA2563b89a62cc69a184b06e388521c5c5e541b9297aef803f0a943f4ad1150bcf1d2
SHA51214bf73ff05571c61e3d9a64cc1c77813edd84d74ec00cc6d24b42dbcca274945cafe474c6f89a0c5ea838ebe5798a9450e92105dd146baa64584771d78995d42
-
Filesize
405KB
MD578b632e2170019348852e20b009b194a
SHA1f62df67d26cadc2c3ce81ac3b212022975d9478a
SHA2563b89a62cc69a184b06e388521c5c5e541b9297aef803f0a943f4ad1150bcf1d2
SHA51214bf73ff05571c61e3d9a64cc1c77813edd84d74ec00cc6d24b42dbcca274945cafe474c6f89a0c5ea838ebe5798a9450e92105dd146baa64584771d78995d42