Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
31/08/2023, 16:44
Static task
static1
Behavioral task
behavioral1
Sample
f5e7c7db2e46f3f819f0efba8382dfe5_icedid_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
f5e7c7db2e46f3f819f0efba8382dfe5_icedid_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
f5e7c7db2e46f3f819f0efba8382dfe5_icedid_JC.exe
-
Size
412KB
-
MD5
f5e7c7db2e46f3f819f0efba8382dfe5
-
SHA1
76feb1fb7fb544a85a55c07c86e5db7ac8d10471
-
SHA256
69f1a584801671c39ae9d5c9478d976f627017688bc039d12964202bf48bb01b
-
SHA512
a2e7d29df96f40b80d6f95695e0cdc068e8a8d6da338d320aee67165ee11786edad5706a1af7d9bdb31c97859747ff1b0a33a48a8069c3742f35fdf53c7a8e4e
-
SSDEEP
12288:fplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:xxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2080 obtains.exe -
Loads dropped DLL 2 IoCs
pid Process 2060 f5e7c7db2e46f3f819f0efba8382dfe5_icedid_JC.exe 2060 f5e7c7db2e46f3f819f0efba8382dfe5_icedid_JC.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\provided\obtains.exe f5e7c7db2e46f3f819f0efba8382dfe5_icedid_JC.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2060 f5e7c7db2e46f3f819f0efba8382dfe5_icedid_JC.exe 2060 f5e7c7db2e46f3f819f0efba8382dfe5_icedid_JC.exe 2060 f5e7c7db2e46f3f819f0efba8382dfe5_icedid_JC.exe 2060 f5e7c7db2e46f3f819f0efba8382dfe5_icedid_JC.exe 2080 obtains.exe 2080 obtains.exe 2080 obtains.exe 2080 obtains.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2080 2060 f5e7c7db2e46f3f819f0efba8382dfe5_icedid_JC.exe 28 PID 2060 wrote to memory of 2080 2060 f5e7c7db2e46f3f819f0efba8382dfe5_icedid_JC.exe 28 PID 2060 wrote to memory of 2080 2060 f5e7c7db2e46f3f819f0efba8382dfe5_icedid_JC.exe 28 PID 2060 wrote to memory of 2080 2060 f5e7c7db2e46f3f819f0efba8382dfe5_icedid_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5e7c7db2e46f3f819f0efba8382dfe5_icedid_JC.exe"C:\Users\Admin\AppData\Local\Temp\f5e7c7db2e46f3f819f0efba8382dfe5_icedid_JC.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Program Files\provided\obtains.exe"C:\Program Files\provided\obtains.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD5a5bd17adc907bfd6826797ab51a400c6
SHA114999d7f170fe6d14cc3cb13fbcc4489c1d9104d
SHA2568383020732894731503fd61a956ca73b9a8aba38e34d66e90f72614d73feed6d
SHA5124ff95e9150357d72ebc7681430f0affe70b07f5145e54ca2eb56c3ed8e590bbfc2d754971c4de9514b34a06a61cd15cbd5ae29949b8b4301845a666644ba9ccb
-
Filesize
412KB
MD5a5bd17adc907bfd6826797ab51a400c6
SHA114999d7f170fe6d14cc3cb13fbcc4489c1d9104d
SHA2568383020732894731503fd61a956ca73b9a8aba38e34d66e90f72614d73feed6d
SHA5124ff95e9150357d72ebc7681430f0affe70b07f5145e54ca2eb56c3ed8e590bbfc2d754971c4de9514b34a06a61cd15cbd5ae29949b8b4301845a666644ba9ccb
-
Filesize
412KB
MD5a5bd17adc907bfd6826797ab51a400c6
SHA114999d7f170fe6d14cc3cb13fbcc4489c1d9104d
SHA2568383020732894731503fd61a956ca73b9a8aba38e34d66e90f72614d73feed6d
SHA5124ff95e9150357d72ebc7681430f0affe70b07f5145e54ca2eb56c3ed8e590bbfc2d754971c4de9514b34a06a61cd15cbd5ae29949b8b4301845a666644ba9ccb
-
Filesize
412KB
MD5a5bd17adc907bfd6826797ab51a400c6
SHA114999d7f170fe6d14cc3cb13fbcc4489c1d9104d
SHA2568383020732894731503fd61a956ca73b9a8aba38e34d66e90f72614d73feed6d
SHA5124ff95e9150357d72ebc7681430f0affe70b07f5145e54ca2eb56c3ed8e590bbfc2d754971c4de9514b34a06a61cd15cbd5ae29949b8b4301845a666644ba9ccb