Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
16-08-2023 17:06
Static task
static1
Behavioral task
behavioral1
Sample
089ec4f804eac4514c1957c4c72d4e76_icedid_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
089ec4f804eac4514c1957c4c72d4e76_icedid_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
089ec4f804eac4514c1957c4c72d4e76_icedid_JC.exe
-
Size
277KB
-
MD5
089ec4f804eac4514c1957c4c72d4e76
-
SHA1
18283a9aba306567639768a72a80d2432398cca5
-
SHA256
f313eef718bfed196db8fa2a3304175c4081015c8ad26dbf5f9f97d0c12885bd
-
SHA512
08b6c4ae964e0f086080a32bba77e2557e4b980103d6922323a30a3e4f9813577f43f4139d681c27db53d9bc3ce61eb559fd1c9c6f62298731018d408cfc26d2
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4872 Composition.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Synthesis\Composition.exe 089ec4f804eac4514c1957c4c72d4e76_icedid_JC.exe File opened for modification C:\Program Files\Synthesis\Composition.exe 089ec4f804eac4514c1957c4c72d4e76_icedid_JC.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1296 089ec4f804eac4514c1957c4c72d4e76_icedid_JC.exe 1296 089ec4f804eac4514c1957c4c72d4e76_icedid_JC.exe 1296 089ec4f804eac4514c1957c4c72d4e76_icedid_JC.exe 1296 089ec4f804eac4514c1957c4c72d4e76_icedid_JC.exe 4872 Composition.exe 4872 Composition.exe 4872 Composition.exe 4872 Composition.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1296 wrote to memory of 4872 1296 089ec4f804eac4514c1957c4c72d4e76_icedid_JC.exe 81 PID 1296 wrote to memory of 4872 1296 089ec4f804eac4514c1957c4c72d4e76_icedid_JC.exe 81 PID 1296 wrote to memory of 4872 1296 089ec4f804eac4514c1957c4c72d4e76_icedid_JC.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\089ec4f804eac4514c1957c4c72d4e76_icedid_JC.exe"C:\Users\Admin\AppData\Local\Temp\089ec4f804eac4514c1957c4c72d4e76_icedid_JC.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Program Files\Synthesis\Composition.exe"C:\Program Files\Synthesis\Composition.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4872
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
278KB
MD5d9395df2adac104f266b2ce92b850f54
SHA153b3483f2360ead081efa90d26e721ea93aff93e
SHA2566bdda9075073aabfcba011c1672729cad323381f78db813ebb0060d38d3f6950
SHA512279f9e17eed134ffa366e56e923a88e5601843885ca0b39e621ac6fa92454549f8bf62a8aa65c7d92bc091fe79ef6e844323e7c51dc8909abcf83acea5f5cb56
-
Filesize
278KB
MD5d9395df2adac104f266b2ce92b850f54
SHA153b3483f2360ead081efa90d26e721ea93aff93e
SHA2566bdda9075073aabfcba011c1672729cad323381f78db813ebb0060d38d3f6950
SHA512279f9e17eed134ffa366e56e923a88e5601843885ca0b39e621ac6fa92454549f8bf62a8aa65c7d92bc091fe79ef6e844323e7c51dc8909abcf83acea5f5cb56