Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 17:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-25_d74cf6fc8064864e1c0b427d6bef792b_icedid.exe
Resource
win7-20231215-en
General
-
Target
2024-01-25_d74cf6fc8064864e1c0b427d6bef792b_icedid.exe
-
Size
313KB
-
MD5
d74cf6fc8064864e1c0b427d6bef792b
-
SHA1
1f6fce2d0f91ab82b306cbec16f0fab738947b9b
-
SHA256
9d5530e0f6f0ab505d97cd6e85873203553dd0594ce9602b03e23dd62a87c725
-
SHA512
998fd7efe963113d12ad0a600bfa724f3bd2cefaed234f0b124571530c45cb100df1885519cb7bfb0493a37818d1f68cbc53eb0a777217d9a1eb9937ea8b7707
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Autorun.exepid process 1904 Autorun.exe -
Loads dropped DLL 2 IoCs
Processes:
2024-01-25_d74cf6fc8064864e1c0b427d6bef792b_icedid.exepid process 1992 2024-01-25_d74cf6fc8064864e1c0b427d6bef792b_icedid.exe 1992 2024-01-25_d74cf6fc8064864e1c0b427d6bef792b_icedid.exe -
Drops file in Program Files directory 2 IoCs
Processes:
2024-01-25_d74cf6fc8064864e1c0b427d6bef792b_icedid.exedescription ioc process File created C:\Program Files\Panel\Autorun.exe 2024-01-25_d74cf6fc8064864e1c0b427d6bef792b_icedid.exe File opened for modification C:\Program Files\Panel\Autorun.exe 2024-01-25_d74cf6fc8064864e1c0b427d6bef792b_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
2024-01-25_d74cf6fc8064864e1c0b427d6bef792b_icedid.exeAutorun.exepid process 1992 2024-01-25_d74cf6fc8064864e1c0b427d6bef792b_icedid.exe 1992 2024-01-25_d74cf6fc8064864e1c0b427d6bef792b_icedid.exe 1992 2024-01-25_d74cf6fc8064864e1c0b427d6bef792b_icedid.exe 1992 2024-01-25_d74cf6fc8064864e1c0b427d6bef792b_icedid.exe 1904 Autorun.exe 1904 Autorun.exe 1904 Autorun.exe 1904 Autorun.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
2024-01-25_d74cf6fc8064864e1c0b427d6bef792b_icedid.exedescription pid process target process PID 1992 wrote to memory of 1904 1992 2024-01-25_d74cf6fc8064864e1c0b427d6bef792b_icedid.exe Autorun.exe PID 1992 wrote to memory of 1904 1992 2024-01-25_d74cf6fc8064864e1c0b427d6bef792b_icedid.exe Autorun.exe PID 1992 wrote to memory of 1904 1992 2024-01-25_d74cf6fc8064864e1c0b427d6bef792b_icedid.exe Autorun.exe PID 1992 wrote to memory of 1904 1992 2024-01-25_d74cf6fc8064864e1c0b427d6bef792b_icedid.exe Autorun.exe PID 1992 wrote to memory of 1904 1992 2024-01-25_d74cf6fc8064864e1c0b427d6bef792b_icedid.exe Autorun.exe PID 1992 wrote to memory of 1904 1992 2024-01-25_d74cf6fc8064864e1c0b427d6bef792b_icedid.exe Autorun.exe PID 1992 wrote to memory of 1904 1992 2024-01-25_d74cf6fc8064864e1c0b427d6bef792b_icedid.exe Autorun.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d74cf6fc8064864e1c0b427d6bef792b_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_d74cf6fc8064864e1c0b427d6bef792b_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Program Files\Panel\Autorun.exe"C:\Program Files\Panel\Autorun.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1904
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
314KB
MD51bb5d4406c8e6d50651ef254926196c4
SHA13271472866a7432e4ad96d3d6d862a1abdaea35c
SHA256f9eb1a7892da587b0af95e6d9098eab8c30d97a20a65571b8b31a31882cd589b
SHA512445d699cce1b1d8c23286dd8ad48f9c4ae47443fd75d5c23a71ec58f678a7b7269e7c00fa40f022deb89d5effd6b51afc12df59e5e0f8b2775236307c925922c
-
Filesize
239KB
MD57a7ac635ee9e9d42bd1a0a8ed3228a02
SHA1061032c4a9ddb23feeb9a60d0487f1edd7c50a14
SHA2562f629d9c18dad0894034d337c499ca9c1946b0687db0dd3d14ae0fb5ce3d7007
SHA51228d9f4891146a2ded565e402e9d63af09325d2ed896d5457b20eb9a75a6d9c8e32cc394e0dca1b791ff9a3a02548e6f4a371046ca1c19b8fe2466cfec19b8774