Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
02-09-2023 16:27
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-22_41d25a8bbc86e7d90de19fe06cdb5aaf_icedid_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-22_41d25a8bbc86e7d90de19fe06cdb5aaf_icedid_JC.exe
Resource
win10v2004-20230831-en
General
-
Target
2023-08-22_41d25a8bbc86e7d90de19fe06cdb5aaf_icedid_JC.exe
-
Size
377KB
-
MD5
41d25a8bbc86e7d90de19fe06cdb5aaf
-
SHA1
828fc9b73fd65ad2a08915edde91d207281bb37a
-
SHA256
88edf2c3a58acd4d420e264571f9eaa3eb4ba1dea5809a863c39f15ed251c132
-
SHA512
7b56a3709fe94ca1fc584665b2e91c28cd17744a134061b3f48df4c6727e986549cb26a6dcfbaf254818c2cc445d1da8c14d98c8d0d52c131ddcf89b5394c143
-
SSDEEP
6144:PplrlbbDdQaqd2X/96fr3KFEUGjr8uB2WgcA0cpXEVNrvGZ4FUqm6:PplrVbDdQaqdS/ofraFErH8uB2Wm0SXj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1680 existing.exe -
Loads dropped DLL 2 IoCs
pid Process 832 2023-08-22_41d25a8bbc86e7d90de19fe06cdb5aaf_icedid_JC.exe 832 2023-08-22_41d25a8bbc86e7d90de19fe06cdb5aaf_icedid_JC.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\components\existing.exe 2023-08-22_41d25a8bbc86e7d90de19fe06cdb5aaf_icedid_JC.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 832 2023-08-22_41d25a8bbc86e7d90de19fe06cdb5aaf_icedid_JC.exe 832 2023-08-22_41d25a8bbc86e7d90de19fe06cdb5aaf_icedid_JC.exe 832 2023-08-22_41d25a8bbc86e7d90de19fe06cdb5aaf_icedid_JC.exe 832 2023-08-22_41d25a8bbc86e7d90de19fe06cdb5aaf_icedid_JC.exe 1680 existing.exe 1680 existing.exe 1680 existing.exe 1680 existing.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 832 wrote to memory of 1680 832 2023-08-22_41d25a8bbc86e7d90de19fe06cdb5aaf_icedid_JC.exe 28 PID 832 wrote to memory of 1680 832 2023-08-22_41d25a8bbc86e7d90de19fe06cdb5aaf_icedid_JC.exe 28 PID 832 wrote to memory of 1680 832 2023-08-22_41d25a8bbc86e7d90de19fe06cdb5aaf_icedid_JC.exe 28 PID 832 wrote to memory of 1680 832 2023-08-22_41d25a8bbc86e7d90de19fe06cdb5aaf_icedid_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-22_41d25a8bbc86e7d90de19fe06cdb5aaf_icedid_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-22_41d25a8bbc86e7d90de19fe06cdb5aaf_icedid_JC.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Program Files\components\existing.exe"C:\Program Files\components\existing.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1680
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD5065691d940b85520f0f4ddf47b7a98cb
SHA1df74244ecf27d77aa2e3114242bf6c63e64217cc
SHA256e60b10471f25baccd93c5248069803da0b5dba3d5700aa3510e9c8bc85a87918
SHA5129629f7c217008e24333db9893a0f1a441bafcb9cbf3148e3eb118ece30aef77fe5b786b07accb4f5cb24405b1b9ed61099832c014f15506fd110e5b5dcbaf76a
-
Filesize
377KB
MD5065691d940b85520f0f4ddf47b7a98cb
SHA1df74244ecf27d77aa2e3114242bf6c63e64217cc
SHA256e60b10471f25baccd93c5248069803da0b5dba3d5700aa3510e9c8bc85a87918
SHA5129629f7c217008e24333db9893a0f1a441bafcb9cbf3148e3eb118ece30aef77fe5b786b07accb4f5cb24405b1b9ed61099832c014f15506fd110e5b5dcbaf76a
-
Filesize
377KB
MD5065691d940b85520f0f4ddf47b7a98cb
SHA1df74244ecf27d77aa2e3114242bf6c63e64217cc
SHA256e60b10471f25baccd93c5248069803da0b5dba3d5700aa3510e9c8bc85a87918
SHA5129629f7c217008e24333db9893a0f1a441bafcb9cbf3148e3eb118ece30aef77fe5b786b07accb4f5cb24405b1b9ed61099832c014f15506fd110e5b5dcbaf76a
-
Filesize
377KB
MD5065691d940b85520f0f4ddf47b7a98cb
SHA1df74244ecf27d77aa2e3114242bf6c63e64217cc
SHA256e60b10471f25baccd93c5248069803da0b5dba3d5700aa3510e9c8bc85a87918
SHA5129629f7c217008e24333db9893a0f1a441bafcb9cbf3148e3eb118ece30aef77fe5b786b07accb4f5cb24405b1b9ed61099832c014f15506fd110e5b5dcbaf76a