Analysis
-
max time kernel
150s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 05:51
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-09_2d77041f9d466bbc42dd7a892bd2855d_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-09_2d77041f9d466bbc42dd7a892bd2855d_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-09_2d77041f9d466bbc42dd7a892bd2855d_icedid.exe
-
Size
298KB
-
MD5
2d77041f9d466bbc42dd7a892bd2855d
-
SHA1
7f8532cb64b91a10612a29dd2ba0f6eb2dd61edf
-
SHA256
f71295b4f241689f192cb219c84ee5a1565b7cf9302508c040698d95f90cd241
-
SHA512
f1702dd3ec204f0316d5c9eabd498ade04c603bdc03fc01f9d1354e82f222016945f1b0e0809ad412e13ab6e9d236467ee7956be3ad3cca851f52dab46c46a0b
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1080 library.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\match\library.exe 2024-01-09_2d77041f9d466bbc42dd7a892bd2855d_icedid.exe File opened for modification C:\Program Files\match\library.exe 2024-01-09_2d77041f9d466bbc42dd7a892bd2855d_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3752 2024-01-09_2d77041f9d466bbc42dd7a892bd2855d_icedid.exe 3752 2024-01-09_2d77041f9d466bbc42dd7a892bd2855d_icedid.exe 3752 2024-01-09_2d77041f9d466bbc42dd7a892bd2855d_icedid.exe 3752 2024-01-09_2d77041f9d466bbc42dd7a892bd2855d_icedid.exe 1080 library.exe 1080 library.exe 1080 library.exe 1080 library.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3752 wrote to memory of 1080 3752 2024-01-09_2d77041f9d466bbc42dd7a892bd2855d_icedid.exe 23 PID 3752 wrote to memory of 1080 3752 2024-01-09_2d77041f9d466bbc42dd7a892bd2855d_icedid.exe 23 PID 3752 wrote to memory of 1080 3752 2024-01-09_2d77041f9d466bbc42dd7a892bd2855d_icedid.exe 23
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-09_2d77041f9d466bbc42dd7a892bd2855d_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-09_2d77041f9d466bbc42dd7a892bd2855d_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Program Files\match\library.exe"C:\Program Files\match\library.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1080
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
299KB
MD56d013a848d9fdb20465730e85533e817
SHA1b8e0cebe098c32cfbf26803beb5229de047c5405
SHA2565657507a3dd11ae771ccca0d524dd160524095007b9bdb40dffb539ddc11dedc
SHA51283ba8daa49e454865c97e8bdf0316319caf4000c42b1de575793e94fef08c7058de2669d13651f9ebc66a1ddcc9021678ea0e78665cb2c9a0dd47fe0ef3926d8
-
Filesize
244KB
MD5314bcfc9b60d10ecc4ce3ceae9ce926f
SHA160cdb8843547c234b1ee9533e8d18de8274fa867
SHA25635720db1b2615d75a8059ff0829f5d8cf17e7213534ae7569f278cb378d8c874
SHA5120a0992fa3e58b059a9a197c29406fe18356a88ba84c1eacea5f5286f5bd3eae5f028db32bd82ff2aee3b077baf69d5f6eff587291c18230a4e0c6fd4a62ff312