Analysis
-
max time kernel
88s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 17:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-25_d74cf6fc8064864e1c0b427d6bef792b_icedid.exe
Resource
win7-20231215-en
General
-
Target
2024-01-25_d74cf6fc8064864e1c0b427d6bef792b_icedid.exe
-
Size
313KB
-
MD5
d74cf6fc8064864e1c0b427d6bef792b
-
SHA1
1f6fce2d0f91ab82b306cbec16f0fab738947b9b
-
SHA256
9d5530e0f6f0ab505d97cd6e85873203553dd0594ce9602b03e23dd62a87c725
-
SHA512
998fd7efe963113d12ad0a600bfa724f3bd2cefaed234f0b124571530c45cb100df1885519cb7bfb0493a37818d1f68cbc53eb0a777217d9a1eb9937ea8b7707
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
compact.exepid process 4032 compact.exe -
Drops file in Program Files directory 2 IoCs
Processes:
2024-01-25_d74cf6fc8064864e1c0b427d6bef792b_icedid.exedescription ioc process File created C:\Program Files\Autorun\compact.exe 2024-01-25_d74cf6fc8064864e1c0b427d6bef792b_icedid.exe File opened for modification C:\Program Files\Autorun\compact.exe 2024-01-25_d74cf6fc8064864e1c0b427d6bef792b_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
2024-01-25_d74cf6fc8064864e1c0b427d6bef792b_icedid.execompact.exepid process 4616 2024-01-25_d74cf6fc8064864e1c0b427d6bef792b_icedid.exe 4616 2024-01-25_d74cf6fc8064864e1c0b427d6bef792b_icedid.exe 4616 2024-01-25_d74cf6fc8064864e1c0b427d6bef792b_icedid.exe 4616 2024-01-25_d74cf6fc8064864e1c0b427d6bef792b_icedid.exe 4032 compact.exe 4032 compact.exe 4032 compact.exe 4032 compact.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
2024-01-25_d74cf6fc8064864e1c0b427d6bef792b_icedid.exedescription pid process target process PID 4616 wrote to memory of 4032 4616 2024-01-25_d74cf6fc8064864e1c0b427d6bef792b_icedid.exe compact.exe PID 4616 wrote to memory of 4032 4616 2024-01-25_d74cf6fc8064864e1c0b427d6bef792b_icedid.exe compact.exe PID 4616 wrote to memory of 4032 4616 2024-01-25_d74cf6fc8064864e1c0b427d6bef792b_icedid.exe compact.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d74cf6fc8064864e1c0b427d6bef792b_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_d74cf6fc8064864e1c0b427d6bef792b_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Program Files\Autorun\compact.exe"C:\Program Files\Autorun\compact.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4032
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
314KB
MD57872aa02192a2d998d3ea1e3b1adcaa6
SHA1901b87f39e11912bef405bde3c163b866d372267
SHA25672f3676de225f84a9739a8ddf403960ca1278e2c0c73b0155423461d3cd4ec52
SHA512ab620508ec473267baf7d9dc188784205ef5f5557b4aac78ab04bfd51057b9d549b3a9ebfa5344188499c3ea9d0ec0cc01467f0dd3907a2c8379c7442c196f25