Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18/01/2024, 22:55
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-18_725313a167cd5f4ef18a0c09b6c39983_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-18_725313a167cd5f4ef18a0c09b6c39983_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-18_725313a167cd5f4ef18a0c09b6c39983_icedid.exe
-
Size
273KB
-
MD5
725313a167cd5f4ef18a0c09b6c39983
-
SHA1
30dacb3ad5a487760b2a82f3965b87c62964f3ff
-
SHA256
24cfdf2b9aafd197f7c0bad019a2c6b60a17b2479f7d7c8e68d6a9402678a68c
-
SHA512
0531c168a2577ca5a761eaf2b42cde154f73b4cc74b6d0f2fa489019d42cb5ae03b8424ed7cdd66f4b53e460b958dfb2901a826f19a478cde401eb44d2f6f8c1
-
SSDEEP
3072:lxUm75Fku3eKeO213SJReOqdmErj+HyHnNVIPL/+ybbiW1u46Q7qV3lU8xM:fU8Dk11CJ1qDWUNVIT/bblS9x
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2744 instead.exe -
Loads dropped DLL 2 IoCs
pid Process 2424 2024-01-18_725313a167cd5f4ef18a0c09b6c39983_icedid.exe 2424 2024-01-18_725313a167cd5f4ef18a0c09b6c39983_icedid.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\future\instead.exe 2024-01-18_725313a167cd5f4ef18a0c09b6c39983_icedid.exe File opened for modification C:\Program Files\future\instead.exe 2024-01-18_725313a167cd5f4ef18a0c09b6c39983_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2424 2024-01-18_725313a167cd5f4ef18a0c09b6c39983_icedid.exe 2424 2024-01-18_725313a167cd5f4ef18a0c09b6c39983_icedid.exe 2424 2024-01-18_725313a167cd5f4ef18a0c09b6c39983_icedid.exe 2424 2024-01-18_725313a167cd5f4ef18a0c09b6c39983_icedid.exe 2744 instead.exe 2744 instead.exe 2744 instead.exe 2744 instead.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2424 wrote to memory of 2744 2424 2024-01-18_725313a167cd5f4ef18a0c09b6c39983_icedid.exe 28 PID 2424 wrote to memory of 2744 2424 2024-01-18_725313a167cd5f4ef18a0c09b6c39983_icedid.exe 28 PID 2424 wrote to memory of 2744 2424 2024-01-18_725313a167cd5f4ef18a0c09b6c39983_icedid.exe 28 PID 2424 wrote to memory of 2744 2424 2024-01-18_725313a167cd5f4ef18a0c09b6c39983_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-18_725313a167cd5f4ef18a0c09b6c39983_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-18_725313a167cd5f4ef18a0c09b6c39983_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files\future\instead.exe"C:\Program Files\future\instead.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2744
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
273KB
MD5608e4667b1d33db0b2f58c8eefbfa5df
SHA197479adcddf72d956743cc3c24f813aadabe29ad
SHA256a4147c23f2b7d4428279e319070542ae35a9c2f534db918ac61c93dd0796fbbf
SHA5121168f25b19508779a982db4f97557ba016b3ac877c6f3950bdb2a04841d02dda09f65efe8a4532a38465e58ee7b82616b788785c6cac03f82f7dc51f5ef0e3b7