Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
17/09/2023, 11:04
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-26_12bd0756140d73a1b1d08bdd20f417aa_icedid_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-26_12bd0756140d73a1b1d08bdd20f417aa_icedid_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-26_12bd0756140d73a1b1d08bdd20f417aa_icedid_JC.exe
-
Size
282KB
-
MD5
12bd0756140d73a1b1d08bdd20f417aa
-
SHA1
efef4f72b918cee8c5f55aac93967c58f2530f2a
-
SHA256
12a61be426d9966e39fde2a149d693ff6e41dc32b9f604e2697a8ee1f1e11bb0
-
SHA512
b08da04d977bc41899ae60acf36c6783e5b0263134133242043dc83adb4638fefbe5b459b601a43d8012f2c3d19715ad678457d8c5b355988245abf2a92c67a4
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2132 choices.exe -
Loads dropped DLL 2 IoCs
pid Process 2172 2023-08-26_12bd0756140d73a1b1d08bdd20f417aa_icedid_JC.exe 2172 2023-08-26_12bd0756140d73a1b1d08bdd20f417aa_icedid_JC.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\upgrade\choices.exe 2023-08-26_12bd0756140d73a1b1d08bdd20f417aa_icedid_JC.exe File opened for modification C:\Program Files\upgrade\choices.exe 2023-08-26_12bd0756140d73a1b1d08bdd20f417aa_icedid_JC.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2172 2023-08-26_12bd0756140d73a1b1d08bdd20f417aa_icedid_JC.exe 2172 2023-08-26_12bd0756140d73a1b1d08bdd20f417aa_icedid_JC.exe 2172 2023-08-26_12bd0756140d73a1b1d08bdd20f417aa_icedid_JC.exe 2172 2023-08-26_12bd0756140d73a1b1d08bdd20f417aa_icedid_JC.exe 2132 choices.exe 2132 choices.exe 2132 choices.exe 2132 choices.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2132 2172 2023-08-26_12bd0756140d73a1b1d08bdd20f417aa_icedid_JC.exe 28 PID 2172 wrote to memory of 2132 2172 2023-08-26_12bd0756140d73a1b1d08bdd20f417aa_icedid_JC.exe 28 PID 2172 wrote to memory of 2132 2172 2023-08-26_12bd0756140d73a1b1d08bdd20f417aa_icedid_JC.exe 28 PID 2172 wrote to memory of 2132 2172 2023-08-26_12bd0756140d73a1b1d08bdd20f417aa_icedid_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-26_12bd0756140d73a1b1d08bdd20f417aa_icedid_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-26_12bd0756140d73a1b1d08bdd20f417aa_icedid_JC.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files\upgrade\choices.exe"C:\Program Files\upgrade\choices.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2132
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
282KB
MD524f1a94d52e5a7514853f2933060ca35
SHA1da2e9c269285a7842c3b54110f9b8722a3c30324
SHA256e8b457ae9b3b7b1a066af76694d718cba4829f30db593c73a6ebd8c7dbafcaea
SHA512190f962c3762c91ec21905a302f41e45d7e16c9dbd740ca3f95567c6edec32143f2e7521aa305be07e835a569d51ba048470e7be35aa7fd8e09354a55acc623e
-
Filesize
282KB
MD524f1a94d52e5a7514853f2933060ca35
SHA1da2e9c269285a7842c3b54110f9b8722a3c30324
SHA256e8b457ae9b3b7b1a066af76694d718cba4829f30db593c73a6ebd8c7dbafcaea
SHA512190f962c3762c91ec21905a302f41e45d7e16c9dbd740ca3f95567c6edec32143f2e7521aa305be07e835a569d51ba048470e7be35aa7fd8e09354a55acc623e
-
Filesize
282KB
MD524f1a94d52e5a7514853f2933060ca35
SHA1da2e9c269285a7842c3b54110f9b8722a3c30324
SHA256e8b457ae9b3b7b1a066af76694d718cba4829f30db593c73a6ebd8c7dbafcaea
SHA512190f962c3762c91ec21905a302f41e45d7e16c9dbd740ca3f95567c6edec32143f2e7521aa305be07e835a569d51ba048470e7be35aa7fd8e09354a55acc623e
-
Filesize
282KB
MD524f1a94d52e5a7514853f2933060ca35
SHA1da2e9c269285a7842c3b54110f9b8722a3c30324
SHA256e8b457ae9b3b7b1a066af76694d718cba4829f30db593c73a6ebd8c7dbafcaea
SHA512190f962c3762c91ec21905a302f41e45d7e16c9dbd740ca3f95567c6edec32143f2e7521aa305be07e835a569d51ba048470e7be35aa7fd8e09354a55acc623e