Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
06/08/2023, 18:55
Static task
static1
Behavioral task
behavioral1
Sample
943bc976ab76ee9b1e602decfadc0a2a_icedid_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
943bc976ab76ee9b1e602decfadc0a2a_icedid_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
943bc976ab76ee9b1e602decfadc0a2a_icedid_JC.exe
-
Size
261KB
-
MD5
943bc976ab76ee9b1e602decfadc0a2a
-
SHA1
6d51edb3a5b91a8dafbf2aa2ac9748cf5a34cd44
-
SHA256
49caa705232a5404c985bdec5d92dd1ac6647a031e4664d5c18fe15e497630bf
-
SHA512
6e89f61dd229ab1e588116c0c2e47d39c55913433a0635fea0c1f9a8c903fd3d42b79c9d7732f2cd20b4c9d4335bdbb94bc40e5a9642c85fb4fb264f94ac5c80
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1284 managed.exe -
Loads dropped DLL 2 IoCs
pid Process 1876 943bc976ab76ee9b1e602decfadc0a2a_icedid_JC.exe 1876 943bc976ab76ee9b1e602decfadc0a2a_icedid_JC.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\requires\managed.exe 943bc976ab76ee9b1e602decfadc0a2a_icedid_JC.exe File opened for modification C:\Program Files\requires\managed.exe 943bc976ab76ee9b1e602decfadc0a2a_icedid_JC.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1876 943bc976ab76ee9b1e602decfadc0a2a_icedid_JC.exe 1876 943bc976ab76ee9b1e602decfadc0a2a_icedid_JC.exe 1876 943bc976ab76ee9b1e602decfadc0a2a_icedid_JC.exe 1876 943bc976ab76ee9b1e602decfadc0a2a_icedid_JC.exe 1284 managed.exe 1284 managed.exe 1284 managed.exe 1284 managed.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1876 wrote to memory of 1284 1876 943bc976ab76ee9b1e602decfadc0a2a_icedid_JC.exe 28 PID 1876 wrote to memory of 1284 1876 943bc976ab76ee9b1e602decfadc0a2a_icedid_JC.exe 28 PID 1876 wrote to memory of 1284 1876 943bc976ab76ee9b1e602decfadc0a2a_icedid_JC.exe 28 PID 1876 wrote to memory of 1284 1876 943bc976ab76ee9b1e602decfadc0a2a_icedid_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\943bc976ab76ee9b1e602decfadc0a2a_icedid_JC.exe"C:\Users\Admin\AppData\Local\Temp\943bc976ab76ee9b1e602decfadc0a2a_icedid_JC.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Program Files\requires\managed.exe"C:\Program Files\requires\managed.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1284
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
261KB
MD51a5a62ac167cad31bdcb801c9c29d35a
SHA1e3c7ea22ae495db8306c19f80e8130395aa97d4b
SHA256ffac6ac55aa3cf2be488557ac47e10a5e60bcce9744517d0446a463275a5a704
SHA5127e53ac60fbb8c33a4acabe9929393030a6742a40dd993e424361584b6b208a8e422b202849b03ea3b235ca5d4e1208fd7c51a6e2a22a82d2e942195fb2948d1f
-
Filesize
261KB
MD51a5a62ac167cad31bdcb801c9c29d35a
SHA1e3c7ea22ae495db8306c19f80e8130395aa97d4b
SHA256ffac6ac55aa3cf2be488557ac47e10a5e60bcce9744517d0446a463275a5a704
SHA5127e53ac60fbb8c33a4acabe9929393030a6742a40dd993e424361584b6b208a8e422b202849b03ea3b235ca5d4e1208fd7c51a6e2a22a82d2e942195fb2948d1f
-
Filesize
261KB
MD51a5a62ac167cad31bdcb801c9c29d35a
SHA1e3c7ea22ae495db8306c19f80e8130395aa97d4b
SHA256ffac6ac55aa3cf2be488557ac47e10a5e60bcce9744517d0446a463275a5a704
SHA5127e53ac60fbb8c33a4acabe9929393030a6742a40dd993e424361584b6b208a8e422b202849b03ea3b235ca5d4e1208fd7c51a6e2a22a82d2e942195fb2948d1f
-
Filesize
261KB
MD51a5a62ac167cad31bdcb801c9c29d35a
SHA1e3c7ea22ae495db8306c19f80e8130395aa97d4b
SHA256ffac6ac55aa3cf2be488557ac47e10a5e60bcce9744517d0446a463275a5a704
SHA5127e53ac60fbb8c33a4acabe9929393030a6742a40dd993e424361584b6b208a8e422b202849b03ea3b235ca5d4e1208fd7c51a6e2a22a82d2e942195fb2948d1f