Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2024, 10:19
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-19_e4734d6671e85db84c5a6a38f2d47287_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-19_e4734d6671e85db84c5a6a38f2d47287_icedid.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-19_e4734d6671e85db84c5a6a38f2d47287_icedid.exe
-
Size
312KB
-
MD5
e4734d6671e85db84c5a6a38f2d47287
-
SHA1
b297f955473a886b22e8ef43cce84c4ff0e6510c
-
SHA256
7ea7ee132739f044291f892c0fcac4dff60671057d1c1bc5008301ed3044db2b
-
SHA512
3f9f5c5a309b6858d943b1f16690cd611b9ae0423c6f234f89f638beade7835de47597fffe334f3aea7392665c81a0ec65807fbfe2c38b1ed99a9cbd5ad93ca8
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4984 Graphics.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\component\Graphics.exe 2024-01-19_e4734d6671e85db84c5a6a38f2d47287_icedid.exe File opened for modification C:\Program Files\component\Graphics.exe 2024-01-19_e4734d6671e85db84c5a6a38f2d47287_icedid.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 2992 svchost.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3768 2024-01-19_e4734d6671e85db84c5a6a38f2d47287_icedid.exe 3768 2024-01-19_e4734d6671e85db84c5a6a38f2d47287_icedid.exe 3768 2024-01-19_e4734d6671e85db84c5a6a38f2d47287_icedid.exe 3768 2024-01-19_e4734d6671e85db84c5a6a38f2d47287_icedid.exe 4984 Graphics.exe 4984 Graphics.exe 4984 Graphics.exe 4984 Graphics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3768 wrote to memory of 4984 3768 2024-01-19_e4734d6671e85db84c5a6a38f2d47287_icedid.exe 88 PID 3768 wrote to memory of 4984 3768 2024-01-19_e4734d6671e85db84c5a6a38f2d47287_icedid.exe 88 PID 3768 wrote to memory of 4984 3768 2024-01-19_e4734d6671e85db84c5a6a38f2d47287_icedid.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-19_e4734d6671e85db84c5a6a38f2d47287_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-19_e4734d6671e85db84c5a6a38f2d47287_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Program Files\component\Graphics.exe"C:\Program Files\component\Graphics.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4984
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:3896
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2992
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312KB
MD5314d4ae014780abdaf0ace429750fe2c
SHA1d94a9483bf614498b1650d4ae885349d08946f29
SHA2562510fcc9217b64ed8ae96deb5ca0e7ebf675d5a30c900976ba3e8ff46d990514
SHA5124af1d5b6df4910d63394d9d9834346426778ee942e169b8a083fa99362177e9c9df63dae50b7720f9894b494232e17991b0591ff23a38756d4a6e2b046056070