Analysis
-
max time kernel
134s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 05:58
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-11_4de94082ee00e5a1ad99b95ea3adc803_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-11_4de94082ee00e5a1ad99b95ea3adc803_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-11_4de94082ee00e5a1ad99b95ea3adc803_icedid.exe
-
Size
307KB
-
MD5
4de94082ee00e5a1ad99b95ea3adc803
-
SHA1
d422cf64e0044d7a31fc1ce3637cb905e33eadbe
-
SHA256
4807eb9dac74c8054d70109b6ce38ffed83d411eb033442880253d5e1bf38f83
-
SHA512
2e5379ce48f46e0e292e951910ebc8ed3131aacb5e3cc20e809cdb885419cfde06f3a201de87afb178020d1f74e29075634940e7155a0000cf2de128edad6255
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 632 Version.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Installed\Version.exe 2024-01-11_4de94082ee00e5a1ad99b95ea3adc803_icedid.exe File opened for modification C:\Program Files\Installed\Version.exe 2024-01-11_4de94082ee00e5a1ad99b95ea3adc803_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4500 2024-01-11_4de94082ee00e5a1ad99b95ea3adc803_icedid.exe 4500 2024-01-11_4de94082ee00e5a1ad99b95ea3adc803_icedid.exe 4500 2024-01-11_4de94082ee00e5a1ad99b95ea3adc803_icedid.exe 4500 2024-01-11_4de94082ee00e5a1ad99b95ea3adc803_icedid.exe 632 Version.exe 632 Version.exe 632 Version.exe 632 Version.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4500 wrote to memory of 632 4500 2024-01-11_4de94082ee00e5a1ad99b95ea3adc803_icedid.exe 20 PID 4500 wrote to memory of 632 4500 2024-01-11_4de94082ee00e5a1ad99b95ea3adc803_icedid.exe 20 PID 4500 wrote to memory of 632 4500 2024-01-11_4de94082ee00e5a1ad99b95ea3adc803_icedid.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-11_4de94082ee00e5a1ad99b95ea3adc803_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-11_4de94082ee00e5a1ad99b95ea3adc803_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Program Files\Installed\Version.exe"C:\Program Files\Installed\Version.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:632
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD530a91becd1dc0cd163552bdecacafb36
SHA1b98da54496d33e7cdd55046ada9899b20057b2c5
SHA25669210e8349b751051f7369233284859e995bf91a3627a62c8d4423373740f468
SHA512b9be3522b67b11bbb9305d30a8f5c86c3faf4cc821b60120eeb74d06e0dba0d5e0e043d682dff0a6fb68a7f59d36335503a6c5ac1cd02f01157a080e46c7547f
-
Filesize
8KB
MD54ff54e86442813f83c6445e8455c943a
SHA1dbef1c485cf484cbe8247484a682d9a5ddacfc9c
SHA256c965fbd8dde0d16c3722f4245c64490cbada59bc81800df6eca4ee719cc00bdb
SHA512d1f6adec7f4e8dd1c5ad23df9852b3afc76a40b2015266c2682c79a916b4fe3e32060dec56c31e3e54930c342ca22863c82c33b51c3170ed67d3b02d44bcf276