Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2024, 22:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-26_d073d36b2f245f91ab4d36d8ec630280_icedid.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-26_d073d36b2f245f91ab4d36d8ec630280_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-26_d073d36b2f245f91ab4d36d8ec630280_icedid.exe
-
Size
424KB
-
MD5
d073d36b2f245f91ab4d36d8ec630280
-
SHA1
d342a958919678b2f8d24ef1e4e086f701f02be4
-
SHA256
7ab730cd94299afccf929ed0ae34035618b0f52d0eb20f7a256930943058d8a9
-
SHA512
f629c628f9502e125a537ef687acae42c56e02af3c1dd8d03a4255071a3e11113d81a6bc34f55b522a2af26dfb3308374045b8574d3fa3c2885ff9a014339e57
-
SSDEEP
12288:AplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:cxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4592 Security.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Graphics\Security.exe 2024-01-26_d073d36b2f245f91ab4d36d8ec630280_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2068 2024-01-26_d073d36b2f245f91ab4d36d8ec630280_icedid.exe 2068 2024-01-26_d073d36b2f245f91ab4d36d8ec630280_icedid.exe 2068 2024-01-26_d073d36b2f245f91ab4d36d8ec630280_icedid.exe 2068 2024-01-26_d073d36b2f245f91ab4d36d8ec630280_icedid.exe 4592 Security.exe 4592 Security.exe 4592 Security.exe 4592 Security.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2068 wrote to memory of 4592 2068 2024-01-26_d073d36b2f245f91ab4d36d8ec630280_icedid.exe 88 PID 2068 wrote to memory of 4592 2068 2024-01-26_d073d36b2f245f91ab4d36d8ec630280_icedid.exe 88 PID 2068 wrote to memory of 4592 2068 2024-01-26_d073d36b2f245f91ab4d36d8ec630280_icedid.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_d073d36b2f245f91ab4d36d8ec630280_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-26_d073d36b2f245f91ab4d36d8ec630280_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files\Graphics\Security.exe"C:\Program Files\Graphics\Security.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4592
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
424KB
MD5ade7926f6286dbbee6474cb24fca39e3
SHA1829a2008fcdf5720c919afabf4f1881686010cc8
SHA256bfdf8d81e3bc2e6ee97031dcf253814d69bbb671a3e3e04460399542ad66fae0
SHA512aed2b0e546282c66dec1497678c1cb21c3371238c3623c84e46f7d56795ee407e371a398165c3d68fd397d4a7cb91cd1214059e11f4b13534f87640ec559e29b