Analysis
-
max time kernel
139s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
22/10/2023, 09:28
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-05_e08ff767de1b2572a2dc2199da08e471_icedid_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.2023-09-05_e08ff767de1b2572a2dc2199da08e471_icedid_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.2023-09-05_e08ff767de1b2572a2dc2199da08e471_icedid_JC.exe
-
Size
1.3MB
-
MD5
e08ff767de1b2572a2dc2199da08e471
-
SHA1
420e81c7fecc4f90f9df7d75fa762c4a6fba6822
-
SHA256
d9b82748757e35261b082e8a7215e3705c24a056ab6318b9a72b8be2cb25811e
-
SHA512
360758f6b97d66e3ca8bca5621813f7922d0c9542721770a11a8c9663d1cdf7baae05df556303afdd7a7855c69d4f0ef700e61eac2ee6682c34f2e79fc003c50
-
SSDEEP
12288:Mccrv6Ck+8HCk+8z7qOeUYlGiUJBCm8VXtTF0ZTOuR:Uvi5YlGi7mCTuOuR
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 NEAS.2023-09-05_e08ff767de1b2572a2dc2199da08e471_icedid_JC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 2736 NEAS.2023-09-05_e08ff767de1b2572a2dc2199da08e471_icedid_JC.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2736 NEAS.2023-09-05_e08ff767de1b2572a2dc2199da08e471_icedid_JC.exe 2736 NEAS.2023-09-05_e08ff767de1b2572a2dc2199da08e471_icedid_JC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-05_e08ff767de1b2572a2dc2199da08e471_icedid_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-05_e08ff767de1b2572a2dc2199da08e471_icedid_JC.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2736