Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
31-10-2023 18:48
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-05_cf2c6269b806d9799c59d4a89299c318_icedid_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.2023-09-05_cf2c6269b806d9799c59d4a89299c318_icedid_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.2023-09-05_cf2c6269b806d9799c59d4a89299c318_icedid_JC.exe
-
Size
283KB
-
MD5
cf2c6269b806d9799c59d4a89299c318
-
SHA1
70ef4da2749a6acbe5fb3a17011feeecb8383fdc
-
SHA256
0b65ccb2afbcc448dbfe0a32fa2a90c03eefbb320e9209eac36d66848e19bc8f
-
SHA512
d03b0ad620f94290076f1b2c96a2fe84106db290b0558a6f2817e85c8432faa90eaef2e0207e548eff97ba5c8be72c4b2880b1af65a9bccf93643d457ffe615b
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2440 code.exe -
Loads dropped DLL 2 IoCs
pid Process 2852 NEAS.2023-09-05_cf2c6269b806d9799c59d4a89299c318_icedid_JC.exe 2852 NEAS.2023-09-05_cf2c6269b806d9799c59d4a89299c318_icedid_JC.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\managed\code.exe NEAS.2023-09-05_cf2c6269b806d9799c59d4a89299c318_icedid_JC.exe File opened for modification C:\Program Files\managed\code.exe NEAS.2023-09-05_cf2c6269b806d9799c59d4a89299c318_icedid_JC.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2852 NEAS.2023-09-05_cf2c6269b806d9799c59d4a89299c318_icedid_JC.exe 2852 NEAS.2023-09-05_cf2c6269b806d9799c59d4a89299c318_icedid_JC.exe 2852 NEAS.2023-09-05_cf2c6269b806d9799c59d4a89299c318_icedid_JC.exe 2852 NEAS.2023-09-05_cf2c6269b806d9799c59d4a89299c318_icedid_JC.exe 2440 code.exe 2440 code.exe 2440 code.exe 2440 code.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2440 2852 NEAS.2023-09-05_cf2c6269b806d9799c59d4a89299c318_icedid_JC.exe 28 PID 2852 wrote to memory of 2440 2852 NEAS.2023-09-05_cf2c6269b806d9799c59d4a89299c318_icedid_JC.exe 28 PID 2852 wrote to memory of 2440 2852 NEAS.2023-09-05_cf2c6269b806d9799c59d4a89299c318_icedid_JC.exe 28 PID 2852 wrote to memory of 2440 2852 NEAS.2023-09-05_cf2c6269b806d9799c59d4a89299c318_icedid_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-05_cf2c6269b806d9799c59d4a89299c318_icedid_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-05_cf2c6269b806d9799c59d4a89299c318_icedid_JC.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Program Files\managed\code.exe"C:\Program Files\managed\code.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2440
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
283KB
MD5afc2b2e4804fa7865a19c24323b4a5ce
SHA181ce482cfd118a64451886aa9433afa50ba7dfea
SHA25652f08e5f72201f1a3046570863cc79f2708c9d66cfcf6d5347b25b0621779c5e
SHA512aa2be70568bf9d8e9ba1b745f475e341d3ffe24440027556b1cb9610f44d675e05aa2d4ca78b85a409b751588011ace2b034c9995ba66b5c4179fe20ef92a942
-
Filesize
283KB
MD5afc2b2e4804fa7865a19c24323b4a5ce
SHA181ce482cfd118a64451886aa9433afa50ba7dfea
SHA25652f08e5f72201f1a3046570863cc79f2708c9d66cfcf6d5347b25b0621779c5e
SHA512aa2be70568bf9d8e9ba1b745f475e341d3ffe24440027556b1cb9610f44d675e05aa2d4ca78b85a409b751588011ace2b034c9995ba66b5c4179fe20ef92a942
-
Filesize
283KB
MD5afc2b2e4804fa7865a19c24323b4a5ce
SHA181ce482cfd118a64451886aa9433afa50ba7dfea
SHA25652f08e5f72201f1a3046570863cc79f2708c9d66cfcf6d5347b25b0621779c5e
SHA512aa2be70568bf9d8e9ba1b745f475e341d3ffe24440027556b1cb9610f44d675e05aa2d4ca78b85a409b751588011ace2b034c9995ba66b5c4179fe20ef92a942
-
Filesize
283KB
MD5afc2b2e4804fa7865a19c24323b4a5ce
SHA181ce482cfd118a64451886aa9433afa50ba7dfea
SHA25652f08e5f72201f1a3046570863cc79f2708c9d66cfcf6d5347b25b0621779c5e
SHA512aa2be70568bf9d8e9ba1b745f475e341d3ffe24440027556b1cb9610f44d675e05aa2d4ca78b85a409b751588011ace2b034c9995ba66b5c4179fe20ef92a942