Analysis
-
max time kernel
117s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 13:26
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-26_863482fa8948f948a21f65f7f09f23af_icedid_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-26_863482fa8948f948a21f65f7f09f23af_icedid_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-26_863482fa8948f948a21f65f7f09f23af_icedid_JC.exe
-
Size
411KB
-
MD5
863482fa8948f948a21f65f7f09f23af
-
SHA1
3432286a809b1a28f9b4e0a9ce40e9a948cc43a5
-
SHA256
7773b454f53f72bb8f598aeb84e84bde068696d47ff8a9a9e876a70e5c30de92
-
SHA512
fcbc503a557152f8ee51febd283ece68123baa7c89c24d9fd76775d5dabf3fd4433b125955e78e734b1d80b1b5e7ad918a4b81124d117f6aa3b52d5459973636
-
SSDEEP
12288:splrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:4xRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2444 games.exe -
Loads dropped DLL 2 IoCs
pid Process 2436 2023-08-26_863482fa8948f948a21f65f7f09f23af_icedid_JC.exe 2436 2023-08-26_863482fa8948f948a21f65f7f09f23af_icedid_JC.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\and\games.exe 2023-08-26_863482fa8948f948a21f65f7f09f23af_icedid_JC.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2436 2023-08-26_863482fa8948f948a21f65f7f09f23af_icedid_JC.exe 2436 2023-08-26_863482fa8948f948a21f65f7f09f23af_icedid_JC.exe 2436 2023-08-26_863482fa8948f948a21f65f7f09f23af_icedid_JC.exe 2436 2023-08-26_863482fa8948f948a21f65f7f09f23af_icedid_JC.exe 2444 games.exe 2444 games.exe 2444 games.exe 2444 games.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2444 2436 2023-08-26_863482fa8948f948a21f65f7f09f23af_icedid_JC.exe 28 PID 2436 wrote to memory of 2444 2436 2023-08-26_863482fa8948f948a21f65f7f09f23af_icedid_JC.exe 28 PID 2436 wrote to memory of 2444 2436 2023-08-26_863482fa8948f948a21f65f7f09f23af_icedid_JC.exe 28 PID 2436 wrote to memory of 2444 2436 2023-08-26_863482fa8948f948a21f65f7f09f23af_icedid_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-26_863482fa8948f948a21f65f7f09f23af_icedid_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-26_863482fa8948f948a21f65f7f09f23af_icedid_JC.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Program Files\and\games.exe"C:\Program Files\and\games.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2444
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
411KB
MD55a0ebd45f4a40446261a9b41038238c4
SHA18221a112f3c812257f3acd06d4b7a7140ff2cd30
SHA25617315e275fc5a1b81ea2401dd6d6aa7da729b84b0c2a922b6bd87ea7f1a0ed4d
SHA512eb8af6c55d7877891d9418a1b1824e9eeee973f35403baf3a33a524bab50b227e49b5f1417ef6f38683fe92e3ed5d08b52069090a8911d9424b78a093e7d872e
-
Filesize
411KB
MD55a0ebd45f4a40446261a9b41038238c4
SHA18221a112f3c812257f3acd06d4b7a7140ff2cd30
SHA25617315e275fc5a1b81ea2401dd6d6aa7da729b84b0c2a922b6bd87ea7f1a0ed4d
SHA512eb8af6c55d7877891d9418a1b1824e9eeee973f35403baf3a33a524bab50b227e49b5f1417ef6f38683fe92e3ed5d08b52069090a8911d9424b78a093e7d872e
-
Filesize
411KB
MD55a0ebd45f4a40446261a9b41038238c4
SHA18221a112f3c812257f3acd06d4b7a7140ff2cd30
SHA25617315e275fc5a1b81ea2401dd6d6aa7da729b84b0c2a922b6bd87ea7f1a0ed4d
SHA512eb8af6c55d7877891d9418a1b1824e9eeee973f35403baf3a33a524bab50b227e49b5f1417ef6f38683fe92e3ed5d08b52069090a8911d9424b78a093e7d872e
-
Filesize
411KB
MD55a0ebd45f4a40446261a9b41038238c4
SHA18221a112f3c812257f3acd06d4b7a7140ff2cd30
SHA25617315e275fc5a1b81ea2401dd6d6aa7da729b84b0c2a922b6bd87ea7f1a0ed4d
SHA512eb8af6c55d7877891d9418a1b1824e9eeee973f35403baf3a33a524bab50b227e49b5f1417ef6f38683fe92e3ed5d08b52069090a8911d9424b78a093e7d872e