Analysis
-
max time kernel
146s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2024 05:40
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-01_38469b8d8b89207ed967b6b75e0d8c18_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-01_38469b8d8b89207ed967b6b75e0d8c18_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-01_38469b8d8b89207ed967b6b75e0d8c18_icedid.exe
-
Size
303KB
-
MD5
38469b8d8b89207ed967b6b75e0d8c18
-
SHA1
b3833dd82dda2ff58493a4ee1b5d5fee8a6e809c
-
SHA256
b1c5e9d400aa63241e944e131db94925e0ac1e1346b033439ae3dec92614c208
-
SHA512
75a3c34ba5fd71c46f7b2339f41a3c3f9187ae6454599cb10baa37042fbbee620ea88c3e219029b3485641ee87de764d8a257f9e12b4c4f1d15aa71f0aec041b
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1812 Russian.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Brazil\Russian.exe 2024-01-01_38469b8d8b89207ed967b6b75e0d8c18_icedid.exe File opened for modification C:\Program Files\Brazil\Russian.exe 2024-01-01_38469b8d8b89207ed967b6b75e0d8c18_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4516 2024-01-01_38469b8d8b89207ed967b6b75e0d8c18_icedid.exe 4516 2024-01-01_38469b8d8b89207ed967b6b75e0d8c18_icedid.exe 4516 2024-01-01_38469b8d8b89207ed967b6b75e0d8c18_icedid.exe 4516 2024-01-01_38469b8d8b89207ed967b6b75e0d8c18_icedid.exe 1812 Russian.exe 1812 Russian.exe 1812 Russian.exe 1812 Russian.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4516 wrote to memory of 1812 4516 2024-01-01_38469b8d8b89207ed967b6b75e0d8c18_icedid.exe 93 PID 4516 wrote to memory of 1812 4516 2024-01-01_38469b8d8b89207ed967b6b75e0d8c18_icedid.exe 93 PID 4516 wrote to memory of 1812 4516 2024-01-01_38469b8d8b89207ed967b6b75e0d8c18_icedid.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-01_38469b8d8b89207ed967b6b75e0d8c18_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-01_38469b8d8b89207ed967b6b75e0d8c18_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Program Files\Brazil\Russian.exe"C:\Program Files\Brazil\Russian.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1812
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD5fa68cc49eeb9a896420c6e96b915d40c
SHA10a269b81902c058e52e43ac024aecbfd9701f149
SHA256f92329f32153003f23f1db693891c0a4973be7b1c93c0b03cadc4c2f9f621e13
SHA512bff3f91fb70d8fcba85f4ba94ed8a90266eb40978daac5074bb29d93c45086198edbaa1e1d31adcd7788adc3cbf16a02b9c1bbe906928d8e1fa500cba118b9dc
-
Filesize
41KB
MD5b8c88b6c42672fadf6752b3247ac5da1
SHA1236f8c75eb64c1b9d3e1c11492dbf6f6cd4f26fc
SHA2568abc5194db6607987280a2ac541cc52c069d949d91cfcda5200e5a9afa970ffa
SHA5120ebb2c165886111dd8346ade116f38914e021938ccfff57ec28287d20d1d8025128d48cd132dcd4544a010f4fb6aa8492362a13ef591a75bfde4a573d8d53e7a