Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05/01/2024, 05:41
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-01_3fef5c5b41edc39848ab61dcd66e6afc_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-01_3fef5c5b41edc39848ab61dcd66e6afc_icedid.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-01_3fef5c5b41edc39848ab61dcd66e6afc_icedid.exe
-
Size
419KB
-
MD5
3fef5c5b41edc39848ab61dcd66e6afc
-
SHA1
94b6cdaafddf2952230042f86adf408d9df8b718
-
SHA256
472768b4f28c7f59f81f318355c196e078c4a85ab662fc69b2afa0458be2eb42
-
SHA512
817a020ca9447068ca938d193ff994548802a1004b917f521a5d9d3314d1e3e424daf3f245c4f122430cdf07e59a02a512f6074ffeeb33f5bf2cd29a1fa82dfe
-
SSDEEP
12288:RplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:jxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2056 indicator.exe -
Loads dropped DLL 2 IoCs
pid Process 1488 2024-01-01_3fef5c5b41edc39848ab61dcd66e6afc_icedid.exe 1488 2024-01-01_3fef5c5b41edc39848ab61dcd66e6afc_icedid.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Update\indicator.exe 2024-01-01_3fef5c5b41edc39848ab61dcd66e6afc_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1488 2024-01-01_3fef5c5b41edc39848ab61dcd66e6afc_icedid.exe 1488 2024-01-01_3fef5c5b41edc39848ab61dcd66e6afc_icedid.exe 1488 2024-01-01_3fef5c5b41edc39848ab61dcd66e6afc_icedid.exe 1488 2024-01-01_3fef5c5b41edc39848ab61dcd66e6afc_icedid.exe 2056 indicator.exe 2056 indicator.exe 2056 indicator.exe 2056 indicator.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1488 wrote to memory of 2056 1488 2024-01-01_3fef5c5b41edc39848ab61dcd66e6afc_icedid.exe 17 PID 1488 wrote to memory of 2056 1488 2024-01-01_3fef5c5b41edc39848ab61dcd66e6afc_icedid.exe 17 PID 1488 wrote to memory of 2056 1488 2024-01-01_3fef5c5b41edc39848ab61dcd66e6afc_icedid.exe 17 PID 1488 wrote to memory of 2056 1488 2024-01-01_3fef5c5b41edc39848ab61dcd66e6afc_icedid.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-01_3fef5c5b41edc39848ab61dcd66e6afc_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-01_3fef5c5b41edc39848ab61dcd66e6afc_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Program Files\Update\indicator.exe"C:\Program Files\Update\indicator.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2056
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d0e05596c0345fbe66dde8499d572b68
SHA1dd6348b3299a0037932b77336fe3375ea06e1272
SHA25696f8e602075ff3ad0e546d94bcefbc7e72b265ae06fc72ecadb530afc517f448
SHA51258fa33d220a90252fdc3cbddac87007d9c0465d584165c2c51dac65fa10cf481ecd5d76e3ca1a059b0c8286da6586136618727c2715ade591e9b94ec9eea7a28
-
Filesize
8KB
MD5d5c476e92b5812b4768c09f1ebffeccc
SHA1b057f115ed118bf22831e5e24cd6b08f680f7636
SHA256fb1a2e558d58956dfee9260fb580e36b676b8268ffd1680c776cb21c409fcec0
SHA5126ab615ae004f2191c2665634ea1d58d5e62e6c5a2de2de07a3a09473b832c82c048c510a7e7f3491f70bdb10b828183fc16c4f542a6d7ef8c6a094566802367d
-
Filesize
8KB
MD5a7bc515d1655614571156988d7741fad
SHA142a269eeed24632ddd11d019b440b25fb5887eef
SHA256024a4f39a55d6b750048ca5ed7aa3544900f8eb97ef486fd1fb9c89c5d633473
SHA5120c83d0682b2a0ae5ad08a884f775b1a2f8bd8c5114d6262f197148c383275cf313d905441f3ae888095388db5ca73e17e93b0c0748787473b5679c1199237061
-
Filesize
36KB
MD5efc0a85b2b0515f26d4aaedd019ba13e
SHA1c669eb096aab74c03df95bb0a81f376a2e0b2c53
SHA256498162b0a41305a8804b698b1b6799e2ec5b951668d1c520b94f283aae8e60d5
SHA512488091cad5ecf050f5f6189bb05613b7db50da2cb64fd0b0b242bbc729e78215e66d3e493aca6152152d8951c116edc0e1bafc708e6c81f6eb2783a573dfaf9f