Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 17:37
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-25_c66e7a84408bf6e8c00f9eddf6adf9e2_icedid.exe
Resource
win7-20231215-en
General
-
Target
2024-01-25_c66e7a84408bf6e8c00f9eddf6adf9e2_icedid.exe
-
Size
428KB
-
MD5
c66e7a84408bf6e8c00f9eddf6adf9e2
-
SHA1
23d4fcd444f2cc56b04d6287eb6a9805537aeb40
-
SHA256
9bcc13bce6bbff4b73904e8adde81556424da71216008e8a9b62b36c278df3cc
-
SHA512
d5b80e0f986214248c577d0106e3356bd43a33ab12192488d3636136ec31bc7fb744108442648a5c74774a6f0306f6fb7b84f7c061003e6fc1a08935ac36cceb
-
SSDEEP
12288:fplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:xxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
status.exepid process 1688 status.exe -
Loads dropped DLL 2 IoCs
Processes:
2024-01-25_c66e7a84408bf6e8c00f9eddf6adf9e2_icedid.exepid process 1944 2024-01-25_c66e7a84408bf6e8c00f9eddf6adf9e2_icedid.exe 1944 2024-01-25_c66e7a84408bf6e8c00f9eddf6adf9e2_icedid.exe -
Drops file in Program Files directory 1 IoCs
Processes:
2024-01-25_c66e7a84408bf6e8c00f9eddf6adf9e2_icedid.exedescription ioc process File created C:\Program Files\Suppress\status.exe 2024-01-25_c66e7a84408bf6e8c00f9eddf6adf9e2_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
2024-01-25_c66e7a84408bf6e8c00f9eddf6adf9e2_icedid.exestatus.exepid process 1944 2024-01-25_c66e7a84408bf6e8c00f9eddf6adf9e2_icedid.exe 1944 2024-01-25_c66e7a84408bf6e8c00f9eddf6adf9e2_icedid.exe 1944 2024-01-25_c66e7a84408bf6e8c00f9eddf6adf9e2_icedid.exe 1944 2024-01-25_c66e7a84408bf6e8c00f9eddf6adf9e2_icedid.exe 1688 status.exe 1688 status.exe 1688 status.exe 1688 status.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
2024-01-25_c66e7a84408bf6e8c00f9eddf6adf9e2_icedid.exedescription pid process target process PID 1944 wrote to memory of 1688 1944 2024-01-25_c66e7a84408bf6e8c00f9eddf6adf9e2_icedid.exe status.exe PID 1944 wrote to memory of 1688 1944 2024-01-25_c66e7a84408bf6e8c00f9eddf6adf9e2_icedid.exe status.exe PID 1944 wrote to memory of 1688 1944 2024-01-25_c66e7a84408bf6e8c00f9eddf6adf9e2_icedid.exe status.exe PID 1944 wrote to memory of 1688 1944 2024-01-25_c66e7a84408bf6e8c00f9eddf6adf9e2_icedid.exe status.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_c66e7a84408bf6e8c00f9eddf6adf9e2_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_c66e7a84408bf6e8c00f9eddf6adf9e2_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Program Files\Suppress\status.exe"C:\Program Files\Suppress\status.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1688
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
429KB
MD5fe5598c4a228950a1634296496572c1b
SHA1c1add335e5699a4a100b7bcd85e5ac9721449b51
SHA25681f0c20c57a097f606c19f3fa74c07208e3bdbdf5f1444dab76a1989ef0f3eb2
SHA5120046a9ce81fab4bf4456a52b05caeef989a9735a33f3cba9d524afd1025a6c8248f6ee6db965e518f5a7c542e2f3274a4c5db7be32c126fc04b25d0d82704e2d