Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
23/01/2024, 20:22
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-23_08a53b66d881020d61fcb1c43d7d95e9_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-23_08a53b66d881020d61fcb1c43d7d95e9_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-23_08a53b66d881020d61fcb1c43d7d95e9_icedid.exe
-
Size
380KB
-
MD5
08a53b66d881020d61fcb1c43d7d95e9
-
SHA1
2164b8699fde8b6ddc46849a64b3ceba8f1695c6
-
SHA256
29b48285af46d9c14ca27b6d1f1e6d030534d1fed98f6714aaa7a0e3765ad5e8
-
SHA512
f184dd144ea0f753b470ebb71524464ee90169688420ee25efd655ab289c475fcd48ee915cc904cc748e6cb8b58219190a612ead1b28119e3c7afb5bc469e223
-
SSDEEP
6144:dplrlbbDdQaqd2X/96fr3KFEUGjr8uB2WgcA0cpXEVNrvGZ4FUqm6:dplrVbDdQaqdS/ofraFErH8uB2Wm0SXj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3252 Polish.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Korean\Polish.exe 2024-01-23_08a53b66d881020d61fcb1c43d7d95e9_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 116 2024-01-23_08a53b66d881020d61fcb1c43d7d95e9_icedid.exe 116 2024-01-23_08a53b66d881020d61fcb1c43d7d95e9_icedid.exe 116 2024-01-23_08a53b66d881020d61fcb1c43d7d95e9_icedid.exe 116 2024-01-23_08a53b66d881020d61fcb1c43d7d95e9_icedid.exe 3252 Polish.exe 3252 Polish.exe 3252 Polish.exe 3252 Polish.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 116 wrote to memory of 3252 116 2024-01-23_08a53b66d881020d61fcb1c43d7d95e9_icedid.exe 87 PID 116 wrote to memory of 3252 116 2024-01-23_08a53b66d881020d61fcb1c43d7d95e9_icedid.exe 87 PID 116 wrote to memory of 3252 116 2024-01-23_08a53b66d881020d61fcb1c43d7d95e9_icedid.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-23_08a53b66d881020d61fcb1c43d7d95e9_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-23_08a53b66d881020d61fcb1c43d7d95e9_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Program Files\Korean\Polish.exe"C:\Program Files\Korean\Polish.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3252
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD53295a42c511ce2761afc3778f95eacee
SHA1dd69f589789916d19561011ca938c3abf5d8292d
SHA256bfc54876b9f89b6d0474f98a872ff9f5608102ad3fa733e0b3fb5beb4468ccb9
SHA512ff4ff00c697560be9b399122d834f4052336c6fcd174dc6f35c0e918a483db9b6373e50ed25975d5267d1b8988a87b513792f921ca233815245179f6064270de