Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 15:35
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-25_5ca3d762e32d652adb1939722fc14a7b_icedid.exe
Resource
win7-20231215-en
General
-
Target
2024-01-25_5ca3d762e32d652adb1939722fc14a7b_icedid.exe
-
Size
388KB
-
MD5
5ca3d762e32d652adb1939722fc14a7b
-
SHA1
cbb246517edf750e810feab219e4040d33d58db8
-
SHA256
73d2a32211f6a0cc853b695c789ba0bcb2a5a3d08b59989e4a703f04ca6e46e7
-
SHA512
8a9b70bc6d27723a84a03648bd64c85b47d8499e64e3d5d8f65389888399c55df6b7598cc084db491c54f45edb9e92905e71a10d4b0a2f6996af25e19ea8d775
-
SSDEEP
12288:2plrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:SxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
message.exepid process 2364 message.exe -
Loads dropped DLL 2 IoCs
Processes:
2024-01-25_5ca3d762e32d652adb1939722fc14a7b_icedid.exepid process 2748 2024-01-25_5ca3d762e32d652adb1939722fc14a7b_icedid.exe 2748 2024-01-25_5ca3d762e32d652adb1939722fc14a7b_icedid.exe -
Drops file in Program Files directory 1 IoCs
Processes:
2024-01-25_5ca3d762e32d652adb1939722fc14a7b_icedid.exedescription ioc process File created C:\Program Files\reporting\message.exe 2024-01-25_5ca3d762e32d652adb1939722fc14a7b_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
2024-01-25_5ca3d762e32d652adb1939722fc14a7b_icedid.exemessage.exepid process 2748 2024-01-25_5ca3d762e32d652adb1939722fc14a7b_icedid.exe 2748 2024-01-25_5ca3d762e32d652adb1939722fc14a7b_icedid.exe 2748 2024-01-25_5ca3d762e32d652adb1939722fc14a7b_icedid.exe 2748 2024-01-25_5ca3d762e32d652adb1939722fc14a7b_icedid.exe 2364 message.exe 2364 message.exe 2364 message.exe 2364 message.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
2024-01-25_5ca3d762e32d652adb1939722fc14a7b_icedid.exedescription pid process target process PID 2748 wrote to memory of 2364 2748 2024-01-25_5ca3d762e32d652adb1939722fc14a7b_icedid.exe message.exe PID 2748 wrote to memory of 2364 2748 2024-01-25_5ca3d762e32d652adb1939722fc14a7b_icedid.exe message.exe PID 2748 wrote to memory of 2364 2748 2024-01-25_5ca3d762e32d652adb1939722fc14a7b_icedid.exe message.exe PID 2748 wrote to memory of 2364 2748 2024-01-25_5ca3d762e32d652adb1939722fc14a7b_icedid.exe message.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_5ca3d762e32d652adb1939722fc14a7b_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_5ca3d762e32d652adb1939722fc14a7b_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Program Files\reporting\message.exe"C:\Program Files\reporting\message.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2364
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Program Files\reporting\message.exeFilesize
388KB
MD5820eaa1ebeb9a2cb6f4879a5102cbb3a
SHA1e05c56a19721dbf5578052442692ccbfb1b652b9
SHA25663370b40f440d2b6aef3c45d24191a5a9ee60850eaf01484bc415af510dfb5f3
SHA512672aab2fa531ae02320dfbcc0277724fbeeccb75846761ab1eb1d5835e446709af42ebb8788695f9a1f91f8c3104383693ed8c5c2e496a9763d821b589db3531