Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13-10-2023 20:57
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-25_c28689082a33238f951306593b93ac26_icedid_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-25_c28689082a33238f951306593b93ac26_icedid_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-25_c28689082a33238f951306593b93ac26_icedid_JC.exe
-
Size
250KB
-
MD5
c28689082a33238f951306593b93ac26
-
SHA1
83dfd3e594377604e03275015929e372df6c994b
-
SHA256
30a0085b1eb42f2639ad4df142501b3653825db391748f7d6d20f7877b077ef9
-
SHA512
208bc42a1cc5dedbe158889a7b47abd04c04aaa0c598a263027071feefbf4ee06ae50c72a77d40509760568581edbeab79ed1a4087eb497943ea080b3d6deb89
-
SSDEEP
3072:lxUm75Fku3eKeO213SJReOqdmErj+HyHnNVIPL/+ybbiW1u46Q7qV3lU8xM:fU8Dk11CJ1qDWUNVIT/bblS9x
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2952 thatcomes.exe -
Loads dropped DLL 2 IoCs
pid Process 2660 2023-08-25_c28689082a33238f951306593b93ac26_icedid_JC.exe 2660 2023-08-25_c28689082a33238f951306593b93ac26_icedid_JC.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\library\thatcomes.exe 2023-08-25_c28689082a33238f951306593b93ac26_icedid_JC.exe File opened for modification C:\Program Files\library\thatcomes.exe 2023-08-25_c28689082a33238f951306593b93ac26_icedid_JC.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2660 2023-08-25_c28689082a33238f951306593b93ac26_icedid_JC.exe 2660 2023-08-25_c28689082a33238f951306593b93ac26_icedid_JC.exe 2660 2023-08-25_c28689082a33238f951306593b93ac26_icedid_JC.exe 2660 2023-08-25_c28689082a33238f951306593b93ac26_icedid_JC.exe 2952 thatcomes.exe 2952 thatcomes.exe 2952 thatcomes.exe 2952 thatcomes.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2952 2660 2023-08-25_c28689082a33238f951306593b93ac26_icedid_JC.exe 28 PID 2660 wrote to memory of 2952 2660 2023-08-25_c28689082a33238f951306593b93ac26_icedid_JC.exe 28 PID 2660 wrote to memory of 2952 2660 2023-08-25_c28689082a33238f951306593b93ac26_icedid_JC.exe 28 PID 2660 wrote to memory of 2952 2660 2023-08-25_c28689082a33238f951306593b93ac26_icedid_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-25_c28689082a33238f951306593b93ac26_icedid_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-25_c28689082a33238f951306593b93ac26_icedid_JC.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files\library\thatcomes.exe"C:\Program Files\library\thatcomes.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2952
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
250KB
MD5e8ed9df0ba4fbbb46665a8f3d9bdba13
SHA1854ae8ae87d7b7810154d67e93b5eab3be6631e4
SHA2562eee42528b9ce4b10d0525d2b56b00d96e3f556d096adc12c7bc02befd2c7c3e
SHA5121b5b51d53aec4e58507a575958b425bee0ac5f238ed00f34f51ecfe149a150425448ac85c8a142d82232c6a2608c3cef6aea534ebc5f37dcfd0262949f234485
-
Filesize
250KB
MD5e8ed9df0ba4fbbb46665a8f3d9bdba13
SHA1854ae8ae87d7b7810154d67e93b5eab3be6631e4
SHA2562eee42528b9ce4b10d0525d2b56b00d96e3f556d096adc12c7bc02befd2c7c3e
SHA5121b5b51d53aec4e58507a575958b425bee0ac5f238ed00f34f51ecfe149a150425448ac85c8a142d82232c6a2608c3cef6aea534ebc5f37dcfd0262949f234485
-
Filesize
250KB
MD5e8ed9df0ba4fbbb46665a8f3d9bdba13
SHA1854ae8ae87d7b7810154d67e93b5eab3be6631e4
SHA2562eee42528b9ce4b10d0525d2b56b00d96e3f556d096adc12c7bc02befd2c7c3e
SHA5121b5b51d53aec4e58507a575958b425bee0ac5f238ed00f34f51ecfe149a150425448ac85c8a142d82232c6a2608c3cef6aea534ebc5f37dcfd0262949f234485
-
Filesize
250KB
MD5e8ed9df0ba4fbbb46665a8f3d9bdba13
SHA1854ae8ae87d7b7810154d67e93b5eab3be6631e4
SHA2562eee42528b9ce4b10d0525d2b56b00d96e3f556d096adc12c7bc02befd2c7c3e
SHA5121b5b51d53aec4e58507a575958b425bee0ac5f238ed00f34f51ecfe149a150425448ac85c8a142d82232c6a2608c3cef6aea534ebc5f37dcfd0262949f234485