Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/01/2024, 15:28
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-22_655927e4fcef826ca17b00ccb8d0be49_icedid.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-22_655927e4fcef826ca17b00ccb8d0be49_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-22_655927e4fcef826ca17b00ccb8d0be49_icedid.exe
-
Size
2.3MB
-
MD5
655927e4fcef826ca17b00ccb8d0be49
-
SHA1
2938cc6ba9f1f81c7260c6223a9a5db20d5b58f4
-
SHA256
70f4d98e59885ec287eed8ec54d7b797024b712f5b26fd9ec4803a54abbaeabd
-
SHA512
4a828b4650a4a3416eab0a7215492265e2ab29f6a64f7ee038dc63f78fb903187be67e01e194746e9ca087c9de1fa582d376efc5fc60fa481722b6f2855b8ec9
-
SSDEEP
49152:1kivTNTpcr/rVtbKRRNfqu/lg7R0t8ihp1dDH:19TppQrnKRTfbgR0Oip1H
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2024-01-22_655927e4fcef826ca17b00ccb8d0be49_icedid.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 2024-01-22_655927e4fcef826ca17b00ccb8d0be49_icedid.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3776 2024-01-22_655927e4fcef826ca17b00ccb8d0be49_icedid.exe