Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
26-08-2023 13:06
Static task
static1
Behavioral task
behavioral1
Sample
a0c7833b2be40ab770e71e5e4f1d6b66_icedid_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
a0c7833b2be40ab770e71e5e4f1d6b66_icedid_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
a0c7833b2be40ab770e71e5e4f1d6b66_icedid_JC.exe
-
Size
1.5MB
-
MD5
a0c7833b2be40ab770e71e5e4f1d6b66
-
SHA1
6de169506f6bf75219359dc3a9f88eea5cba328b
-
SHA256
7e75bff93680fb0819f471705ed84a71198cd9e3ce79aefd66ee824771e2940b
-
SHA512
b7619ab2a1914a676c454df0effa836488b497abfa0a669890cba04cb6d6cc6ba11133562b8f61de3d9f83be55742e6c144085baa4ffabcd76ab93bb0f35282c
-
SSDEEP
24576:+eKJw43yH/lvaQWDGMMEW4vM0IqYNn+zcVT2pLj3HCCSLbVpkCb:+b8zivxIqYNn+4h25jXCCyhpkCb
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1964 a0c7833b2be40ab770e71e5e4f1d6b66_icedid_JC.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1964 a0c7833b2be40ab770e71e5e4f1d6b66_icedid_JC.exe