Analysis
-
max time kernel
120s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10/01/2024, 05:59
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-09_ab86e43022111d92002e959b428d9c10_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-09_ab86e43022111d92002e959b428d9c10_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-09_ab86e43022111d92002e959b428d9c10_icedid.exe
-
Size
423KB
-
MD5
ab86e43022111d92002e959b428d9c10
-
SHA1
f3b00b85d6dfa507dbf42cb01083c1485f194309
-
SHA256
763670ff3a1362677e76a588b066f675f4fa1589af2568a41544b410ddc863dd
-
SHA512
1a1a5771902d0d5982a730c578bf5079b8b93f5dcf17e11741da7cee54882a7ad63ec7cc06ce679370951be9fb6537b903ba0dc29fee5f9db24601007ffd6565
-
SSDEEP
12288:1plrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:nxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2876 managed.exe -
Loads dropped DLL 2 IoCs
pid Process 2292 2024-01-09_ab86e43022111d92002e959b428d9c10_icedid.exe 2292 2024-01-09_ab86e43022111d92002e959b428d9c10_icedid.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\requires\managed.exe 2024-01-09_ab86e43022111d92002e959b428d9c10_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2292 2024-01-09_ab86e43022111d92002e959b428d9c10_icedid.exe 2292 2024-01-09_ab86e43022111d92002e959b428d9c10_icedid.exe 2292 2024-01-09_ab86e43022111d92002e959b428d9c10_icedid.exe 2292 2024-01-09_ab86e43022111d92002e959b428d9c10_icedid.exe 2876 managed.exe 2876 managed.exe 2876 managed.exe 2876 managed.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2876 2292 2024-01-09_ab86e43022111d92002e959b428d9c10_icedid.exe 28 PID 2292 wrote to memory of 2876 2292 2024-01-09_ab86e43022111d92002e959b428d9c10_icedid.exe 28 PID 2292 wrote to memory of 2876 2292 2024-01-09_ab86e43022111d92002e959b428d9c10_icedid.exe 28 PID 2292 wrote to memory of 2876 2292 2024-01-09_ab86e43022111d92002e959b428d9c10_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-09_ab86e43022111d92002e959b428d9c10_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-09_ab86e43022111d92002e959b428d9c10_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files\requires\managed.exe"C:\Program Files\requires\managed.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2876
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
423KB
MD5557cbece3cbf2f2ac4d6bc69ad399d33
SHA16652edc276f5bb456adba5b26a5be316e4879bd0
SHA2569e4f5d978f0d297043b7886f38bbf23aaf5b145aae1a16ef91cb07c65d82c28d
SHA512f3c1a6a6ef109d7271aaa13c4e3d2e8ce4fe47294e79f53566a0832fc7684fca20d955ceea0ad1a457a19c335e1782ae9da80ace0c7b2cb9b544e4be239a4279