Analysis
-
max time kernel
154s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2024, 05:49
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-01_b922d80ff922ee3f812f4ca0c00f75ae_icedid.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-01_b922d80ff922ee3f812f4ca0c00f75ae_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-01_b922d80ff922ee3f812f4ca0c00f75ae_icedid.exe
-
Size
296KB
-
MD5
b922d80ff922ee3f812f4ca0c00f75ae
-
SHA1
ac8f4750f3c78574234973e76d6a9f3dea24c5c2
-
SHA256
4b5e749b800690ee4bbf36aa3fdd0d0018b94c1f52332fa2fe4be7e2d9a9d7de
-
SHA512
fb2f7804c455952d217247a74a9d26e903def739151e4ea8ea0e368f8ec752587905f55c6ebd14bfd13344db52eaaf34aad3e9109dcd8fd9923ad2fe83a05f2e
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3424 privileges.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Internals\privileges.exe 2024-01-01_b922d80ff922ee3f812f4ca0c00f75ae_icedid.exe File opened for modification C:\Program Files\Internals\privileges.exe 2024-01-01_b922d80ff922ee3f812f4ca0c00f75ae_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 232 2024-01-01_b922d80ff922ee3f812f4ca0c00f75ae_icedid.exe 232 2024-01-01_b922d80ff922ee3f812f4ca0c00f75ae_icedid.exe 232 2024-01-01_b922d80ff922ee3f812f4ca0c00f75ae_icedid.exe 232 2024-01-01_b922d80ff922ee3f812f4ca0c00f75ae_icedid.exe 3424 privileges.exe 3424 privileges.exe 3424 privileges.exe 3424 privileges.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 232 wrote to memory of 3424 232 2024-01-01_b922d80ff922ee3f812f4ca0c00f75ae_icedid.exe 94 PID 232 wrote to memory of 3424 232 2024-01-01_b922d80ff922ee3f812f4ca0c00f75ae_icedid.exe 94 PID 232 wrote to memory of 3424 232 2024-01-01_b922d80ff922ee3f812f4ca0c00f75ae_icedid.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-01_b922d80ff922ee3f812f4ca0c00f75ae_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-01_b922d80ff922ee3f812f4ca0c00f75ae_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Program Files\Internals\privileges.exe"C:\Program Files\Internals\privileges.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3424
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
297KB
MD523dda030f5c9d0a232b43011a9ff3861
SHA12068ac45a88dad0846a66b7763fdb085c32e9c42
SHA256b36b80d19f073592d016044da900031926316ba8ea8c07501512e30c288de350
SHA51266721590ada3777fe46e959b3a6598cd580f3d1cb6d69fc6ccaa622131c91b63d661ee24b858126917bd121fd6433211acd316a1615ee1bb0e9815a0ac87feb2