Analysis
-
max time kernel
93s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2024, 18:28
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-24_af130b1f47e5cf4cdbd2119828c76b89_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-24_af130b1f47e5cf4cdbd2119828c76b89_icedid.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-24_af130b1f47e5cf4cdbd2119828c76b89_icedid.exe
-
Size
311KB
-
MD5
af130b1f47e5cf4cdbd2119828c76b89
-
SHA1
1ba76fc278dbdf7ee060546aacd608349b856cd8
-
SHA256
1985e7708e15a22edd6088a923a199523e6eb83542fd1eb86b107d5bf596a780
-
SHA512
bd86326e44a427766022f6da141438646cede7be0308305071f29dc4c207477c3fa40072e9b72c9bd35be93bef13668e6ae0e50060db48ac933610f2c7be3e91
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3968 supports.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\systems\supports.exe 2024-01-24_af130b1f47e5cf4cdbd2119828c76b89_icedid.exe File opened for modification C:\Program Files\systems\supports.exe 2024-01-24_af130b1f47e5cf4cdbd2119828c76b89_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3444 2024-01-24_af130b1f47e5cf4cdbd2119828c76b89_icedid.exe 3444 2024-01-24_af130b1f47e5cf4cdbd2119828c76b89_icedid.exe 3444 2024-01-24_af130b1f47e5cf4cdbd2119828c76b89_icedid.exe 3444 2024-01-24_af130b1f47e5cf4cdbd2119828c76b89_icedid.exe 3968 supports.exe 3968 supports.exe 3968 supports.exe 3968 supports.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3444 wrote to memory of 3968 3444 2024-01-24_af130b1f47e5cf4cdbd2119828c76b89_icedid.exe 58 PID 3444 wrote to memory of 3968 3444 2024-01-24_af130b1f47e5cf4cdbd2119828c76b89_icedid.exe 58 PID 3444 wrote to memory of 3968 3444 2024-01-24_af130b1f47e5cf4cdbd2119828c76b89_icedid.exe 58
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-24_af130b1f47e5cf4cdbd2119828c76b89_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-24_af130b1f47e5cf4cdbd2119828c76b89_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Program Files\systems\supports.exe"C:\Program Files\systems\supports.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3968
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
311KB
MD51a33932993cc54719d5282fa69bc5b4a
SHA19389d26993533ea734a98a088a57772fb1e151db
SHA256b5477fdfcac3582faf4d0053857e820bdc77a1534e1f11b766feb1be83143ce3
SHA512cfe04742b999439854c0f1c263b74f22d54eeef6ac7249e65547ee8018e720747d1ad2556643f1501a7c4c1a6bb98cbc0fcb0c6932cb8b8b3a444f4ae1001a8a