Analysis
-
max time kernel
142s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2023, 19:06
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-26_c83044641bb98d34354550e4401b2746_icedid_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-26_c83044641bb98d34354550e4401b2746_icedid_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-26_c83044641bb98d34354550e4401b2746_icedid_JC.exe
-
Size
450KB
-
MD5
c83044641bb98d34354550e4401b2746
-
SHA1
f43a8afcce164d050f2231d3aebaa83b503c914e
-
SHA256
bc50eedce050a7cf6d823b7efe4304292c495402030caafbb3370d77a6c3e1fa
-
SHA512
1504dc7b023f7cf97eb797aec22ac2acdf8859b8b65e41cd60f3147899c3f3f562ab4824d00d54cd708c138d5f7a18f05bd2386d83d5495e6772ab4024692386
-
SSDEEP
6144:HXrLMJagzLISLsbP+ozL9rOMW9sqEhAChE+o2pFN9guGudPkc+kVprI4:31SLsb+o9IGqEhAChE+zH9guGuNOkV5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4524 rundl123.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\134.175.219.4:17323 rundl123.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3768 2023-08-26_c83044641bb98d34354550e4401b2746_icedid_JC.exe 3768 2023-08-26_c83044641bb98d34354550e4401b2746_icedid_JC.exe 4524 rundl123.exe 4524 rundl123.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3768 wrote to memory of 4524 3768 2023-08-26_c83044641bb98d34354550e4401b2746_icedid_JC.exe 88 PID 3768 wrote to memory of 4524 3768 2023-08-26_c83044641bb98d34354550e4401b2746_icedid_JC.exe 88 PID 3768 wrote to memory of 4524 3768 2023-08-26_c83044641bb98d34354550e4401b2746_icedid_JC.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-26_c83044641bb98d34354550e4401b2746_icedid_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-26_c83044641bb98d34354550e4401b2746_icedid_JC.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3768 -
\??\c:\ProgramData\rundl123.exe"c:\ProgramData\rundl123.exe"2⤵
- Executes dropped EXE
- NTFS ADS
- Suspicious use of SetWindowsHookEx
PID:4524
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
450KB
MD5c83044641bb98d34354550e4401b2746
SHA1f43a8afcce164d050f2231d3aebaa83b503c914e
SHA256bc50eedce050a7cf6d823b7efe4304292c495402030caafbb3370d77a6c3e1fa
SHA5121504dc7b023f7cf97eb797aec22ac2acdf8859b8b65e41cd60f3147899c3f3f562ab4824d00d54cd708c138d5f7a18f05bd2386d83d5495e6772ab4024692386
-
Filesize
450KB
MD5c83044641bb98d34354550e4401b2746
SHA1f43a8afcce164d050f2231d3aebaa83b503c914e
SHA256bc50eedce050a7cf6d823b7efe4304292c495402030caafbb3370d77a6c3e1fa
SHA5121504dc7b023f7cf97eb797aec22ac2acdf8859b8b65e41cd60f3147899c3f3f562ab4824d00d54cd708c138d5f7a18f05bd2386d83d5495e6772ab4024692386