Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
17/08/2023, 15:55
Static task
static1
Behavioral task
behavioral1
Sample
15eb93090db8afe545655801723133dd_icedid_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
15eb93090db8afe545655801723133dd_icedid_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
15eb93090db8afe545655801723133dd_icedid_JC.exe
-
Size
397KB
-
MD5
15eb93090db8afe545655801723133dd
-
SHA1
0bda80f6ae39dacb9096dc12cfdc3706b0bed19c
-
SHA256
91192372af0c89f347894847af9d3f77474b87eb777ae3cc7edf558241759283
-
SHA512
305c0e12dd622ea11235063fc4e6d85825f50cff861a85c09bf46afb8b78796f521118a49436bc91673eee63abc8f92175e1caf2dd26f0ca745a125c13dcba32
-
SSDEEP
12288:splrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:4xRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2348 Traditional.exe -
Loads dropped DLL 2 IoCs
pid Process 1072 15eb93090db8afe545655801723133dd_icedid_JC.exe 1072 15eb93090db8afe545655801723133dd_icedid_JC.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Chinese\Traditional.exe 15eb93090db8afe545655801723133dd_icedid_JC.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1072 15eb93090db8afe545655801723133dd_icedid_JC.exe 1072 15eb93090db8afe545655801723133dd_icedid_JC.exe 1072 15eb93090db8afe545655801723133dd_icedid_JC.exe 1072 15eb93090db8afe545655801723133dd_icedid_JC.exe 2348 Traditional.exe 2348 Traditional.exe 2348 Traditional.exe 2348 Traditional.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1072 wrote to memory of 2348 1072 15eb93090db8afe545655801723133dd_icedid_JC.exe 28 PID 1072 wrote to memory of 2348 1072 15eb93090db8afe545655801723133dd_icedid_JC.exe 28 PID 1072 wrote to memory of 2348 1072 15eb93090db8afe545655801723133dd_icedid_JC.exe 28 PID 1072 wrote to memory of 2348 1072 15eb93090db8afe545655801723133dd_icedid_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\15eb93090db8afe545655801723133dd_icedid_JC.exe"C:\Users\Admin\AppData\Local\Temp\15eb93090db8afe545655801723133dd_icedid_JC.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Program Files\Chinese\Traditional.exe"C:\Program Files\Chinese\Traditional.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2348
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD5cdceb6c0456c182c7027d6ef263d25a8
SHA125cc30332c349a468ea92dbf9ed50779a2883f30
SHA25657bb2e76dba8704fc267c523205fcb85649d041d9c350acc1d0b62b6eb118c35
SHA5128ebbca6aa9dee3f26d7cc9868bd890c3dd0ad550a4a4f37b9f29d66da92cfcaf69603a1049e3a78ecfedde9d27544f3e40ed0e77851c861ed73088da0aeb5e10
-
Filesize
397KB
MD5cdceb6c0456c182c7027d6ef263d25a8
SHA125cc30332c349a468ea92dbf9ed50779a2883f30
SHA25657bb2e76dba8704fc267c523205fcb85649d041d9c350acc1d0b62b6eb118c35
SHA5128ebbca6aa9dee3f26d7cc9868bd890c3dd0ad550a4a4f37b9f29d66da92cfcaf69603a1049e3a78ecfedde9d27544f3e40ed0e77851c861ed73088da0aeb5e10
-
Filesize
397KB
MD5cdceb6c0456c182c7027d6ef263d25a8
SHA125cc30332c349a468ea92dbf9ed50779a2883f30
SHA25657bb2e76dba8704fc267c523205fcb85649d041d9c350acc1d0b62b6eb118c35
SHA5128ebbca6aa9dee3f26d7cc9868bd890c3dd0ad550a4a4f37b9f29d66da92cfcaf69603a1049e3a78ecfedde9d27544f3e40ed0e77851c861ed73088da0aeb5e10
-
Filesize
397KB
MD5cdceb6c0456c182c7027d6ef263d25a8
SHA125cc30332c349a468ea92dbf9ed50779a2883f30
SHA25657bb2e76dba8704fc267c523205fcb85649d041d9c350acc1d0b62b6eb118c35
SHA5128ebbca6aa9dee3f26d7cc9868bd890c3dd0ad550a4a4f37b9f29d66da92cfcaf69603a1049e3a78ecfedde9d27544f3e40ed0e77851c861ed73088da0aeb5e10