Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18-01-2024 23:04
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-18_8f588dfda4863eaf380b11ab65863700_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-18_8f588dfda4863eaf380b11ab65863700_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-18_8f588dfda4863eaf380b11ab65863700_icedid.exe
-
Size
311KB
-
MD5
8f588dfda4863eaf380b11ab65863700
-
SHA1
afad873981fd460064932898b52f876976e91fc8
-
SHA256
13554d1f4d15b0260ca8981ed565dda6ad68feaf2a1e058af76c31130dfd3c67
-
SHA512
f927f7c526a509b983e49c52a37ec1710f4a9881ba04943437c599675963d57f56c42a4e1220b933aaf1fd5e853ac44171c84bac909491224fa7203da57a7dc1
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2536 function.exe -
Loads dropped DLL 2 IoCs
pid Process 1540 2024-01-18_8f588dfda4863eaf380b11ab65863700_icedid.exe 1540 2024-01-18_8f588dfda4863eaf380b11ab65863700_icedid.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\depend\function.exe 2024-01-18_8f588dfda4863eaf380b11ab65863700_icedid.exe File opened for modification C:\Program Files\depend\function.exe 2024-01-18_8f588dfda4863eaf380b11ab65863700_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1540 2024-01-18_8f588dfda4863eaf380b11ab65863700_icedid.exe 1540 2024-01-18_8f588dfda4863eaf380b11ab65863700_icedid.exe 1540 2024-01-18_8f588dfda4863eaf380b11ab65863700_icedid.exe 1540 2024-01-18_8f588dfda4863eaf380b11ab65863700_icedid.exe 2536 function.exe 2536 function.exe 2536 function.exe 2536 function.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1540 wrote to memory of 2536 1540 2024-01-18_8f588dfda4863eaf380b11ab65863700_icedid.exe 28 PID 1540 wrote to memory of 2536 1540 2024-01-18_8f588dfda4863eaf380b11ab65863700_icedid.exe 28 PID 1540 wrote to memory of 2536 1540 2024-01-18_8f588dfda4863eaf380b11ab65863700_icedid.exe 28 PID 1540 wrote to memory of 2536 1540 2024-01-18_8f588dfda4863eaf380b11ab65863700_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-18_8f588dfda4863eaf380b11ab65863700_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-18_8f588dfda4863eaf380b11ab65863700_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Program Files\depend\function.exe"C:\Program Files\depend\function.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2536
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD572fe9b3250525580c4fbacc9c81c0d1f
SHA11372aa553d86f2448dfa1d61c6d64b63384ae5f3
SHA2560ff1cac2d613545b62aa55b1f65ea08a6dcaaa2fbdade844f0f62b19eac00181
SHA512584dbf8869d265f58dd5f824c1ead5e1278908ca8769d2785db81184fa8adaadea86323fedf896a260e4d10f044e788989d3d008e0d0f851acfbc8773882b1ca
-
Filesize
84KB
MD5e69fd65f8a0e1beda700144771366603
SHA1fa49c2df69c46bf6a1bdb36401e5b4dfad9461e6
SHA256a0e68d408f47058c03d025846933ef4fa63a1f4a9e79b8c1900f995fc93b9925
SHA512eeb4111c54da989dbf65a52706ee84aee61f45c09ed7054f1ee07173a719dc607df64ab408535146d779272c254e4aa82c801621fa9494c8d67853136ce93e48
-
Filesize
186KB
MD55e9591e7655b1ab82504550e7bd0c0f2
SHA1b0af3a28b31734f430b1983e77da2666bc44eb65
SHA2568d6740943bfc3c8f2ea8c1a4b06ce041fb74737af06f5b157e77699d520d66c9
SHA51288c4619ebc4d385c4e3220a0411088e3f5ec2163c43fb6dbd5f4e5c5849c4097e0f280eb861391cc990cf8e715fb82fd04ffb435d2492dc5f38aaf0b3bf8af99
-
Filesize
114KB
MD5c8d91e4da1d2f06803403f6aacb18885
SHA132ec8407be581958f4acc6bea91a92c9f8466034
SHA2561e4c802bc34702d59d3e90e4f6e0d23544e3f6701945e30f6b3fc0ed8fabd74c
SHA5121b6f28b04c00e2e1e7cc81ce9b1285b3ba88309d69cb55ce16331944f828f343314367d10c10a3863156308817a3abfce32ff4a3c770c21292c249a0e4b96363