Analysis
-
max time kernel
141s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2023, 15:42
Static task
static1
Behavioral task
behavioral1
Sample
57e714aad9505aae152cb3e41c347764_icedid_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
57e714aad9505aae152cb3e41c347764_icedid_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
57e714aad9505aae152cb3e41c347764_icedid_JC.exe
-
Size
375KB
-
MD5
57e714aad9505aae152cb3e41c347764
-
SHA1
8372ba5a6d8201722652dcf32566671688f6349b
-
SHA256
5b9b73fc153cbf01f332fbfcc0e94cc0672c55eebe1a7da7058e29ffd948618a
-
SHA512
73d1adb0bd843ee944757016479aab99033c5df485d1df4903632115cd565482a97f8af38fa2edb67e189cf53dc35acdb99948aaf20cbb1b4ae853d2578e4e9b
-
SSDEEP
6144:+plrlbbDdQaqd2X/96fr3KFEUGjr8uB2WgcA0cpXEVNrvGZ4FUqm6:+plrVbDdQaqdS/ofraFErH8uB2Wm0SXj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3832 verify.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\code\verify.exe 57e714aad9505aae152cb3e41c347764_icedid_JC.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4028 57e714aad9505aae152cb3e41c347764_icedid_JC.exe 4028 57e714aad9505aae152cb3e41c347764_icedid_JC.exe 4028 57e714aad9505aae152cb3e41c347764_icedid_JC.exe 4028 57e714aad9505aae152cb3e41c347764_icedid_JC.exe 3832 verify.exe 3832 verify.exe 3832 verify.exe 3832 verify.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4028 wrote to memory of 3832 4028 57e714aad9505aae152cb3e41c347764_icedid_JC.exe 82 PID 4028 wrote to memory of 3832 4028 57e714aad9505aae152cb3e41c347764_icedid_JC.exe 82 PID 4028 wrote to memory of 3832 4028 57e714aad9505aae152cb3e41c347764_icedid_JC.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\57e714aad9505aae152cb3e41c347764_icedid_JC.exe"C:\Users\Admin\AppData\Local\Temp\57e714aad9505aae152cb3e41c347764_icedid_JC.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Program Files\code\verify.exe"C:\Program Files\code\verify.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3832
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
375KB
MD5b7fce37b2dcc3b338b8b57a0a261e272
SHA10320eb33c68b7bb67a550db0130020454008c5fc
SHA25657b06b6b24183b18e5cceab90130cc2c60257cbecd627c2d94f4316c9fec720b
SHA512783ac9fc9cc1c6c99e6bd97a0a1c0837a933acc4f813e5332b212f4e775d0897aac9e26cf010e2a7b53c4d8d75d35930f625c4f6d6def2241bfcdc97790d2e32
-
Filesize
375KB
MD5b7fce37b2dcc3b338b8b57a0a261e272
SHA10320eb33c68b7bb67a550db0130020454008c5fc
SHA25657b06b6b24183b18e5cceab90130cc2c60257cbecd627c2d94f4316c9fec720b
SHA512783ac9fc9cc1c6c99e6bd97a0a1c0837a933acc4f813e5332b212f4e775d0897aac9e26cf010e2a7b53c4d8d75d35930f625c4f6d6def2241bfcdc97790d2e32