Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-01-2024 00:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-24_c1c048d153a902d02a2a67120716731e_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-24_c1c048d153a902d02a2a67120716731e_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-24_c1c048d153a902d02a2a67120716731e_icedid.exe
-
Size
312KB
-
MD5
c1c048d153a902d02a2a67120716731e
-
SHA1
a7c4986dfd18544c29f8ec1dfdd6b1fb80b8d13f
-
SHA256
4c9072c8c792902fe027e803d0d2be2a0743b9da80633bd34601b323d1e0ae22
-
SHA512
8649a99a81644ca1ce1539667341d2a78d57b9894f71df0155bea2f4ee39dca388491f44b864436fe6ea21bf395525c3bd37896af2179c92bafb2816dc82d8ba
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2984 Publishers.exe -
Loads dropped DLL 2 IoCs
pid Process 2520 2024-01-24_c1c048d153a902d02a2a67120716731e_icedid.exe 2520 2024-01-24_c1c048d153a902d02a2a67120716731e_icedid.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Kaufmann\Publishers.exe 2024-01-24_c1c048d153a902d02a2a67120716731e_icedid.exe File opened for modification C:\Program Files\Kaufmann\Publishers.exe 2024-01-24_c1c048d153a902d02a2a67120716731e_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2520 2024-01-24_c1c048d153a902d02a2a67120716731e_icedid.exe 2520 2024-01-24_c1c048d153a902d02a2a67120716731e_icedid.exe 2520 2024-01-24_c1c048d153a902d02a2a67120716731e_icedid.exe 2520 2024-01-24_c1c048d153a902d02a2a67120716731e_icedid.exe 2984 Publishers.exe 2984 Publishers.exe 2984 Publishers.exe 2984 Publishers.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2984 2520 2024-01-24_c1c048d153a902d02a2a67120716731e_icedid.exe 28 PID 2520 wrote to memory of 2984 2520 2024-01-24_c1c048d153a902d02a2a67120716731e_icedid.exe 28 PID 2520 wrote to memory of 2984 2520 2024-01-24_c1c048d153a902d02a2a67120716731e_icedid.exe 28 PID 2520 wrote to memory of 2984 2520 2024-01-24_c1c048d153a902d02a2a67120716731e_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-24_c1c048d153a902d02a2a67120716731e_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-24_c1c048d153a902d02a2a67120716731e_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files\Kaufmann\Publishers.exe"C:\Program Files\Kaufmann\Publishers.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2984
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
313KB
MD5f6a0417e15ff4b3c3b3dca6e735cb528
SHA11982c6ab2fbeb12c23e0e47210fac37a488da7c6
SHA256a2b4548a562c003fea5273a20be98263c13c803a87b2d22f0bb00cdd8f42f204
SHA5122f91add717bb535bd98369d1ea9611a9060e4e34d0e91e047202500491604cb2904c13de99f9871cb7b7c832278242d5cad6fe998420a23b96c114f90025c93d