Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18/01/2024, 22:59
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-18_7fa4faf8471b9eb9645d264e2b6712ba_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-18_7fa4faf8471b9eb9645d264e2b6712ba_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-18_7fa4faf8471b9eb9645d264e2b6712ba_icedid.exe
-
Size
272KB
-
MD5
7fa4faf8471b9eb9645d264e2b6712ba
-
SHA1
680afb67dbfdcdf07a1388445502813a3e380d73
-
SHA256
9351e57eebd456be078840c6f562663a458ac92b34d54fdd4d6dcd1dbffe49be
-
SHA512
2e5ce56a2cc7571f28330586ec86db943bebab800487b6643e3ce58f1d0a53484f77d0145fc9e164ab7b924f5396805349bb55d8988022a6fc248418df5f93c7
-
SSDEEP
3072:lxUm75Fku3eKeO213SJReOqdmErj+HyHnNVIPL/+ybbiW1u46Q7qV3lU8xM:fU8Dk11CJ1qDWUNVIT/bblS9x
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2480 future.exe -
Loads dropped DLL 2 IoCs
pid Process 2156 2024-01-18_7fa4faf8471b9eb9645d264e2b6712ba_icedid.exe 2156 2024-01-18_7fa4faf8471b9eb9645d264e2b6712ba_icedid.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\December\future.exe 2024-01-18_7fa4faf8471b9eb9645d264e2b6712ba_icedid.exe File opened for modification C:\Program Files\December\future.exe 2024-01-18_7fa4faf8471b9eb9645d264e2b6712ba_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2156 2024-01-18_7fa4faf8471b9eb9645d264e2b6712ba_icedid.exe 2156 2024-01-18_7fa4faf8471b9eb9645d264e2b6712ba_icedid.exe 2156 2024-01-18_7fa4faf8471b9eb9645d264e2b6712ba_icedid.exe 2156 2024-01-18_7fa4faf8471b9eb9645d264e2b6712ba_icedid.exe 2480 future.exe 2480 future.exe 2480 future.exe 2480 future.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2480 2156 2024-01-18_7fa4faf8471b9eb9645d264e2b6712ba_icedid.exe 28 PID 2156 wrote to memory of 2480 2156 2024-01-18_7fa4faf8471b9eb9645d264e2b6712ba_icedid.exe 28 PID 2156 wrote to memory of 2480 2156 2024-01-18_7fa4faf8471b9eb9645d264e2b6712ba_icedid.exe 28 PID 2156 wrote to memory of 2480 2156 2024-01-18_7fa4faf8471b9eb9645d264e2b6712ba_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-18_7fa4faf8471b9eb9645d264e2b6712ba_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-18_7fa4faf8471b9eb9645d264e2b6712ba_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files\December\future.exe"C:\Program Files\December\future.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2480
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
272KB
MD5cd5a32b912f1963eb55ddc844fa6bac4
SHA179a07c12be621454888d384f8820c7c9754022dd
SHA2560ec34e81df187e9072645f455a2ea356b1e04ae02616cb5b0b55d9b859b5edb8
SHA512665d7dcace73469e9c71d19d355a51e2103150c0e3b792b580f59251bb38d6fe3feae62b4734dade14cf5de766b675c029507cdc42787f09e47e83b9494716f6