Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18/01/2024, 22:22
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-18_01908d4d14b0879718dd1115be1795bf_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-18_01908d4d14b0879718dd1115be1795bf_icedid.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-18_01908d4d14b0879718dd1115be1795bf_icedid.exe
-
Size
304KB
-
MD5
01908d4d14b0879718dd1115be1795bf
-
SHA1
ac376715d3adb7da2f25b2436eb51be7aff28bf6
-
SHA256
912c53601749f22e3a6d6f3a06960dd7ddb3b698d7f77a6180a64ef8ba6caf8a
-
SHA512
b3ddee70a540965e60cc9c11a4bb6a59abe439a6fc9e5d131f00b8a80185b73476a43f1238acdb00121f297db3f2a0a8655ad349185e0b19032f94a63d1dc590
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2468 demonstrates.exe -
Loads dropped DLL 2 IoCs
pid Process 2780 2024-01-18_01908d4d14b0879718dd1115be1795bf_icedid.exe 2780 2024-01-18_01908d4d14b0879718dd1115be1795bf_icedid.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\customizing\demonstrates.exe 2024-01-18_01908d4d14b0879718dd1115be1795bf_icedid.exe File opened for modification C:\Program Files\customizing\demonstrates.exe 2024-01-18_01908d4d14b0879718dd1115be1795bf_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2780 2024-01-18_01908d4d14b0879718dd1115be1795bf_icedid.exe 2780 2024-01-18_01908d4d14b0879718dd1115be1795bf_icedid.exe 2780 2024-01-18_01908d4d14b0879718dd1115be1795bf_icedid.exe 2780 2024-01-18_01908d4d14b0879718dd1115be1795bf_icedid.exe 2468 demonstrates.exe 2468 demonstrates.exe 2468 demonstrates.exe 2468 demonstrates.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2468 2780 2024-01-18_01908d4d14b0879718dd1115be1795bf_icedid.exe 28 PID 2780 wrote to memory of 2468 2780 2024-01-18_01908d4d14b0879718dd1115be1795bf_icedid.exe 28 PID 2780 wrote to memory of 2468 2780 2024-01-18_01908d4d14b0879718dd1115be1795bf_icedid.exe 28 PID 2780 wrote to memory of 2468 2780 2024-01-18_01908d4d14b0879718dd1115be1795bf_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-18_01908d4d14b0879718dd1115be1795bf_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-18_01908d4d14b0879718dd1115be1795bf_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Program Files\customizing\demonstrates.exe"C:\Program Files\customizing\demonstrates.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2468
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304KB
MD502c685fb2cdbf1df50f75c094d721dd8
SHA1fa9b6ad998790f5a498cd1811a371bbb106169f7
SHA25649ed93a733bedb1b8e86fc9fd086c1f8d983ad5c5483ac7006c181db23bd7e38
SHA512b5c0d1d88bfaa870233d828fe7772ac76dc95f9b04cf3d4fb05bcd14a865a86eb9b81ad28eb68219e4e699c2877f8327e285d2f83e6fdd6a98a4e0d2ed381242