Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2023, 16:22
Static task
static1
Behavioral task
behavioral1
Sample
5f288b2ae3da18d3109a85a21e82cf98_icedid_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
5f288b2ae3da18d3109a85a21e82cf98_icedid_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
5f288b2ae3da18d3109a85a21e82cf98_icedid_JC.exe
-
Size
371KB
-
MD5
5f288b2ae3da18d3109a85a21e82cf98
-
SHA1
7a44d6521e8db50447456c718c54abe356751c47
-
SHA256
a581aa6f271c45b714980de3538eca93ec428812eb75d3a49896cfe159c830e3
-
SHA512
6c267b364b8e93c6e4c1a55bd4dd96452741937128178aaa1dbb13855956d9061d239b66af5a6d765b2736d32f44daba1235ca6e1b203c77caa48504d36df88b
-
SSDEEP
6144:kplrlbbDdQaqd2X/96fr3KFEUGjr8uB2WgcA0cpXEVNrvGZ4FUqm6:kplrVbDdQaqdS/ofraFErH8uB2Wm0SXj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3780 Chinese.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\languages\Chinese.exe 5f288b2ae3da18d3109a85a21e82cf98_icedid_JC.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2220 5f288b2ae3da18d3109a85a21e82cf98_icedid_JC.exe 2220 5f288b2ae3da18d3109a85a21e82cf98_icedid_JC.exe 2220 5f288b2ae3da18d3109a85a21e82cf98_icedid_JC.exe 2220 5f288b2ae3da18d3109a85a21e82cf98_icedid_JC.exe 3780 Chinese.exe 3780 Chinese.exe 3780 Chinese.exe 3780 Chinese.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2220 wrote to memory of 3780 2220 5f288b2ae3da18d3109a85a21e82cf98_icedid_JC.exe 82 PID 2220 wrote to memory of 3780 2220 5f288b2ae3da18d3109a85a21e82cf98_icedid_JC.exe 82 PID 2220 wrote to memory of 3780 2220 5f288b2ae3da18d3109a85a21e82cf98_icedid_JC.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f288b2ae3da18d3109a85a21e82cf98_icedid_JC.exe"C:\Users\Admin\AppData\Local\Temp\5f288b2ae3da18d3109a85a21e82cf98_icedid_JC.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files\languages\Chinese.exe"C:\Program Files\languages\Chinese.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3780
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
371KB
MD5fe777b56b57eafbb4053b8ef8c0a5467
SHA17e3a139ded0114a234647237cba0b0d31277c61f
SHA256a890689c6550c69b206df05568940d3fbedd4abc5c7ddc90dc13dc5273f3358d
SHA512b09f7a20b97fdf5380f76feb8d4a23fe9be0db27dfe5bb4aae13e74d88d75f674b12d4f535d3247481c381460fbfb38a8984e1741a6a760a3d286f8771a03c7a
-
Filesize
371KB
MD5fe777b56b57eafbb4053b8ef8c0a5467
SHA17e3a139ded0114a234647237cba0b0d31277c61f
SHA256a890689c6550c69b206df05568940d3fbedd4abc5c7ddc90dc13dc5273f3358d
SHA512b09f7a20b97fdf5380f76feb8d4a23fe9be0db27dfe5bb4aae13e74d88d75f674b12d4f535d3247481c381460fbfb38a8984e1741a6a760a3d286f8771a03c7a