Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
23/01/2024, 19:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-23_5022e82620669173cf7f4d0803ec9b46_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-23_5022e82620669173cf7f4d0803ec9b46_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-23_5022e82620669173cf7f4d0803ec9b46_icedid.exe
-
Size
380KB
-
MD5
5022e82620669173cf7f4d0803ec9b46
-
SHA1
9ec28f5751f2ecc951b54905517fb3b69c5b6e4a
-
SHA256
6bcc4a1da5d200d1c0d1209ee00d3b1721c40c680a2ce5fa6527272fee3cc893
-
SHA512
865fa002c26bcfbd35a618d6ea2bf096fce2b37e8ef936b0a8dbf85d6996cc5b9e9a450056d0382a683f3edea29196e44bc2a1d1a054c716276dfc79f4a87b4a
-
SSDEEP
6144:WplrlbbDdQaqd2X/96fr3KFEUGjr8uB2WgcA0cpXEVNrvGZ4FUqm6:WplrVbDdQaqdS/ofraFErH8uB2Wm0SXj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2916 GetVersion.exe -
Loads dropped DLL 2 IoCs
pid Process 1840 2024-01-23_5022e82620669173cf7f4d0803ec9b46_icedid.exe 1840 2024-01-23_5022e82620669173cf7f4d0803ec9b46_icedid.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Sample\GetVersion.exe 2024-01-23_5022e82620669173cf7f4d0803ec9b46_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1840 2024-01-23_5022e82620669173cf7f4d0803ec9b46_icedid.exe 1840 2024-01-23_5022e82620669173cf7f4d0803ec9b46_icedid.exe 1840 2024-01-23_5022e82620669173cf7f4d0803ec9b46_icedid.exe 1840 2024-01-23_5022e82620669173cf7f4d0803ec9b46_icedid.exe 2916 GetVersion.exe 2916 GetVersion.exe 2916 GetVersion.exe 2916 GetVersion.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1840 wrote to memory of 2916 1840 2024-01-23_5022e82620669173cf7f4d0803ec9b46_icedid.exe 18 PID 1840 wrote to memory of 2916 1840 2024-01-23_5022e82620669173cf7f4d0803ec9b46_icedid.exe 18 PID 1840 wrote to memory of 2916 1840 2024-01-23_5022e82620669173cf7f4d0803ec9b46_icedid.exe 18 PID 1840 wrote to memory of 2916 1840 2024-01-23_5022e82620669173cf7f4d0803ec9b46_icedid.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-23_5022e82620669173cf7f4d0803ec9b46_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-23_5022e82620669173cf7f4d0803ec9b46_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Program Files\Sample\GetVersion.exe"C:\Program Files\Sample\GetVersion.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2916
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
296KB
MD550bd26b963990c7aa7ea1c8c011656c1
SHA129bc5fa0396c8d7508e3e6cce6399f7335050ff6
SHA2566befbba4650bd7ee9f52a6ceb3135ba8203ae0faa37596ddaf0ee8ac3066341e
SHA5124c822a1b1a833f8f7384981e53337ff2a5082aeeb5e772f56ef17684e6660883b9915b5f1e0726bc6daa6fbbb23169fd845de0bdd9ab9a680096aa1e91ada0d2
-
Filesize
183KB
MD5497b4fc7bf1c8bf1c9c1e89f9a88ce81
SHA177b774553d15d8bdd13218e6a9ec4179209f34c4
SHA2560e010225992df0f98dc9618efa9dd05d88bc7576a210c291fbff5a5bf9c47d25
SHA512e0dda39ed84fedb879b6b7c2c19854411b267cb213923fd17898ce308fdcb47d6d0eb78cbc5094aefac0823bcbb2d3d81994e4ae4d2fa4f2ba6856866cb28f1c
-
Filesize
377KB
MD5e98710b3c241099c073e18fdd0985ca2
SHA1d21881fa87577f74edb6a37fdb7a130d7831034e
SHA256c90fced3aa26254e821afe9d2ca5ef105aa06fb4cfdc177b5bb96abc807ad527
SHA51258bc82887ceec83aa8210c655e87c873b31ec10543b327a9db718e00d19ca8d5316346d226fd9a174c3f5bf8c83ecee42129d908b37dc6db17daad10c8542af2
-
Filesize
268KB
MD5ee84339c25303460f6b798385add669e
SHA11d04b3b0e5e7b137f5052aaf9a5e0af43ec18d17
SHA25614995c42e87e1a58f28b55e3cadbb949d0abd9d011585a70c9b25b071018ca32
SHA512151ec13f2aabcfa9721219a028e7578508613533061760473bde99d454152bf23dee494aa49eb1435ac645491e02d72147725d3cf2dee3dda6ecaeb3b600a06d