Analysis
-
max time kernel
117s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09-01-2024 06:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-08_8562d55cc807056bdad60327902e57d5_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-08_8562d55cc807056bdad60327902e57d5_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-08_8562d55cc807056bdad60327902e57d5_icedid.exe
-
Size
384KB
-
MD5
8562d55cc807056bdad60327902e57d5
-
SHA1
b7ca5b979b597e89fcce88eeceea5adbfea9710e
-
SHA256
ea77ee322a268203ee025d05f449e9eadde7a4c4cf44eecd4d87916482d544d0
-
SHA512
55844b513172d2a096945447bb097c437d0b21f05b6c25c8434fddf579acdfea0ae1b7d2e7c77bcffd2bdf1ad0435497d5f4d0858549b893476f9b011923cd7b
-
SSDEEP
12288:dplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:/xRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2712 Enabling.exe -
Loads dropped DLL 2 IoCs
pid Process 2228 2024-01-08_8562d55cc807056bdad60327902e57d5_icedid.exe 2228 2024-01-08_8562d55cc807056bdad60327902e57d5_icedid.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Custom\Enabling.exe 2024-01-08_8562d55cc807056bdad60327902e57d5_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2228 2024-01-08_8562d55cc807056bdad60327902e57d5_icedid.exe 2228 2024-01-08_8562d55cc807056bdad60327902e57d5_icedid.exe 2228 2024-01-08_8562d55cc807056bdad60327902e57d5_icedid.exe 2228 2024-01-08_8562d55cc807056bdad60327902e57d5_icedid.exe 2712 Enabling.exe 2712 Enabling.exe 2712 Enabling.exe 2712 Enabling.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2712 2228 2024-01-08_8562d55cc807056bdad60327902e57d5_icedid.exe 27 PID 2228 wrote to memory of 2712 2228 2024-01-08_8562d55cc807056bdad60327902e57d5_icedid.exe 27 PID 2228 wrote to memory of 2712 2228 2024-01-08_8562d55cc807056bdad60327902e57d5_icedid.exe 27 PID 2228 wrote to memory of 2712 2228 2024-01-08_8562d55cc807056bdad60327902e57d5_icedid.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-08_8562d55cc807056bdad60327902e57d5_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-08_8562d55cc807056bdad60327902e57d5_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Program Files\Custom\Enabling.exe"C:\Program Files\Custom\Enabling.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD51288f8c503a1882ae4c8d1485a83f0b7
SHA19948e94864ff05b3b337b68948be92a6c294eb03
SHA256c6040d8f577261eca2a8dcab224e99692fcc7d143d0b0d15d1b98f6498e56f55
SHA5128e7463c02fa8b93c940ab56bef0ea749200389724e36a0f819e700b14baba0047d4b209bc64449966fbbdffd3fda690c6959c8880313e9b32992c9a74f380982