Analysis
-
max time kernel
0s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12-01-2024 06:04
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-11_b3cd14c483fd76b686c4ad999443ac14_icedid.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-11_b3cd14c483fd76b686c4ad999443ac14_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-11_b3cd14c483fd76b686c4ad999443ac14_icedid.exe
-
Size
868KB
-
MD5
b3cd14c483fd76b686c4ad999443ac14
-
SHA1
dcf16b1e46d85ff4a7399a81639d843ad844f48d
-
SHA256
b50881ca73399e7571028164f345440f29c478e620026d6c9a71d6111bccc2eb
-
SHA512
8fb12664e0d5ff16f928b7cd6728ae2b84aa344e37c9a0749a9a4b077d35851db94a041f53e5265a6e9659dccb3fea9960b68d46987998aa62f54e3efc3bf939
-
SSDEEP
12288:6Ft1+YJ2VYMHq8GhDFQGFNrIyUNWPuLjZpzbf3yD8JMjpy:6Ft1LuqJhDqGFeyUQPurCD8JMjU
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IP.lnk 2024-01-11_b3cd14c483fd76b686c4ad999443ac14_icedid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2976 2024-01-11_b3cd14c483fd76b686c4ad999443ac14_icedid.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2976 2024-01-11_b3cd14c483fd76b686c4ad999443ac14_icedid.exe 2976 2024-01-11_b3cd14c483fd76b686c4ad999443ac14_icedid.exe