Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2023 18:44
Static task
static1
Behavioral task
behavioral1
Sample
d8d4f7ea22262947a291dbc2bdb8797f_icedid_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
d8d4f7ea22262947a291dbc2bdb8797f_icedid_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
d8d4f7ea22262947a291dbc2bdb8797f_icedid_JC.exe
-
Size
7.5MB
-
MD5
d8d4f7ea22262947a291dbc2bdb8797f
-
SHA1
b5e2451daf3f64e43aebb530d560142c81eb766a
-
SHA256
d31f4d25c9a9997bafc2e979b12bebe8140e1aaed50ad17603243d04684906b8
-
SHA512
91ff2611774f7be26d15cc3076a9054fe37ac134ab3e8d43858f8a0b124dabecf0953fbaa4014693c00fe4f8b1bd7221635bc6cf5e3c1c66cd0d72ff5b30a7e1
-
SSDEEP
196608:gmY+yOJg84m2ts51P5RVUW/wtwEB2KUdXz/txRAwGztK8Zl:U8wm2IBRd/wtwEwKOBgZK6l
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1956 autorun.exe -
Loads dropped DLL 5 IoCs
pid Process 1956 autorun.exe 1956 autorun.exe 1956 autorun.exe 1956 autorun.exe 1956 autorun.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1956 autorun.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4312 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4312 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 752 d8d4f7ea22262947a291dbc2bdb8797f_icedid_JC.exe 1956 autorun.exe 1956 autorun.exe 1956 autorun.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 752 wrote to memory of 1956 752 d8d4f7ea22262947a291dbc2bdb8797f_icedid_JC.exe 80 PID 752 wrote to memory of 1956 752 d8d4f7ea22262947a291dbc2bdb8797f_icedid_JC.exe 80 PID 752 wrote to memory of 1956 752 d8d4f7ea22262947a291dbc2bdb8797f_icedid_JC.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\d8d4f7ea22262947a291dbc2bdb8797f_icedid_JC.exe"C:\Users\Admin\AppData\Local\Temp\d8d4f7ea22262947a291dbc2bdb8797f_icedid_JC.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\autorun.exe"C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\autorun.exe" "SFXSOURCE:C:\Users\Admin\AppData\Local\Temp\d8d4f7ea22262947a291dbc2bdb8797f_icedid_JC.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1956
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x33c 0x3381⤵
- Suspicious use of AdjustPrivilegeToken
PID:4312
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200KB
MD5a649eb82e6d39e68a8eb468a4b049cfd
SHA110cfb3f5ad59c9b09804bbf46c29d0ac5ed15c26
SHA256ea2adc07660fa2fbdde5c41c433ec6e9a395bef6ff1a76a6b848a77cb2f67563
SHA512b8c51babac8bc70aba2d5b29f22ea8132cb28bcbea8b140e588e74448052eb6fe3e9fda64e240265815b3a78b4a578ace65789e604cd337198a28cfdf6dda92a
-
Filesize
200KB
MD5a649eb82e6d39e68a8eb468a4b049cfd
SHA110cfb3f5ad59c9b09804bbf46c29d0ac5ed15c26
SHA256ea2adc07660fa2fbdde5c41c433ec6e9a395bef6ff1a76a6b848a77cb2f67563
SHA512b8c51babac8bc70aba2d5b29f22ea8132cb28bcbea8b140e588e74448052eb6fe3e9fda64e240265815b3a78b4a578ace65789e604cd337198a28cfdf6dda92a
-
Filesize
200KB
MD5a649eb82e6d39e68a8eb468a4b049cfd
SHA110cfb3f5ad59c9b09804bbf46c29d0ac5ed15c26
SHA256ea2adc07660fa2fbdde5c41c433ec6e9a395bef6ff1a76a6b848a77cb2f67563
SHA512b8c51babac8bc70aba2d5b29f22ea8132cb28bcbea8b140e588e74448052eb6fe3e9fda64e240265815b3a78b4a578ace65789e604cd337198a28cfdf6dda92a
-
Filesize
753KB
MD50870f7f36a240bac4b8e543715444992
SHA18d7ba5fb5625626c7de5c32cdc9425ec3e059399
SHA256575fdcb1d8af719fd15326326ac8eca414565922d155422de5becad55c11373a
SHA51297cda99a5d7c1f1ed24be1c9e86c0004f4e3297e6eb99ad271428d7bc54011f959715421b46ceffed753b8a732e3cc54daed0f2472ccc0c71b2010006ea93689
-
Filesize
753KB
MD50870f7f36a240bac4b8e543715444992
SHA18d7ba5fb5625626c7de5c32cdc9425ec3e059399
SHA256575fdcb1d8af719fd15326326ac8eca414565922d155422de5becad55c11373a
SHA51297cda99a5d7c1f1ed24be1c9e86c0004f4e3297e6eb99ad271428d7bc54011f959715421b46ceffed753b8a732e3cc54daed0f2472ccc0c71b2010006ea93689
-
Filesize
753KB
MD50870f7f36a240bac4b8e543715444992
SHA18d7ba5fb5625626c7de5c32cdc9425ec3e059399
SHA256575fdcb1d8af719fd15326326ac8eca414565922d155422de5becad55c11373a
SHA51297cda99a5d7c1f1ed24be1c9e86c0004f4e3297e6eb99ad271428d7bc54011f959715421b46ceffed753b8a732e3cc54daed0f2472ccc0c71b2010006ea93689
-
Filesize
1.7MB
MD55b9dce90d6e8f66d4e2e4fe998a8617a
SHA1de45da4821b2998600bb37666748c19acdaf04ea
SHA2560a6c05496b631aba6d0941468a58fbd95f1efe4f24116ca55f32aed3bce66020
SHA5124ac5da991e60cae84d76b15ca18d09f5970501a05f89915b0f864504edb940e4ab692a296e3c79b7df0b7f693b9766c95da9023ee9d5e9ad90559468749cb64b
-
Filesize
6.1MB
MD58ef0c3a6d671a0321991896b1dd8abbe
SHA148cbe2c07960fccaf0009e70ceda78b59752c031
SHA2565994c41eaa0a5de5143b40644371581aeb77ef7c1c68840aa16784ef8bf13dce
SHA5128c3b2c79a6a3d5a399ffbc9b4b3957da4df5bf710c8b784447a86b9569e619cdaf10d117ec211cc6747d2e9f991242c01098963451a8d15de740dfb8bdbfae97
-
Filesize
6.1MB
MD58ef0c3a6d671a0321991896b1dd8abbe
SHA148cbe2c07960fccaf0009e70ceda78b59752c031
SHA2565994c41eaa0a5de5143b40644371581aeb77ef7c1c68840aa16784ef8bf13dce
SHA5128c3b2c79a6a3d5a399ffbc9b4b3957da4df5bf710c8b784447a86b9569e619cdaf10d117ec211cc6747d2e9f991242c01098963451a8d15de740dfb8bdbfae97
-
Filesize
24KB
MD5a8fafed52da2ffe7abfba2cf2a699544
SHA16f622eabce9653b84c5bf69117adf3b8a29b43f0
SHA25610c5b851067e404c44f52ebe15d6197643c529920b994ce593376ecfbd69a325
SHA512426690526230eb7bce7983e3c61ac441b7bdf8df9154df81c88adb5275a213edb3a4b61b44ad15c5451b09e2f49da87bc4edf2e8b76b706ef9004280bf2c038d
-
Filesize
24KB
MD5a8fafed52da2ffe7abfba2cf2a699544
SHA16f622eabce9653b84c5bf69117adf3b8a29b43f0
SHA25610c5b851067e404c44f52ebe15d6197643c529920b994ce593376ecfbd69a325
SHA512426690526230eb7bce7983e3c61ac441b7bdf8df9154df81c88adb5275a213edb3a4b61b44ad15c5451b09e2f49da87bc4edf2e8b76b706ef9004280bf2c038d
-
Filesize
318KB
MD5feef4703e27d5f36517dcd1d4fd7d2b4
SHA125962c4f6523b27394133682b9ebb4b3e3e8bb6d
SHA2562f54d57bcfa726de8a37942cb3d166a1a171f5dc555cc30e7e6f62ac66f85076
SHA512160729b3f79b46198b88dbee511edd6378f1ed4e081a245b0596d9b9d8b610288ea9791d49bd6e2de2bc262f1c1e3c987fdabf18b7e2a025fa1808d319719501
-
Filesize
318KB
MD5feef4703e27d5f36517dcd1d4fd7d2b4
SHA125962c4f6523b27394133682b9ebb4b3e3e8bb6d
SHA2562f54d57bcfa726de8a37942cb3d166a1a171f5dc555cc30e7e6f62ac66f85076
SHA512160729b3f79b46198b88dbee511edd6378f1ed4e081a245b0596d9b9d8b610288ea9791d49bd6e2de2bc262f1c1e3c987fdabf18b7e2a025fa1808d319719501