Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/01/2024, 11:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-26_f20e3398ae2daac19a6c61bb730ba843_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-26_f20e3398ae2daac19a6c61bb730ba843_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-26_f20e3398ae2daac19a6c61bb730ba843_icedid.exe
-
Size
312KB
-
MD5
f20e3398ae2daac19a6c61bb730ba843
-
SHA1
1cc46e1e2169c633689f9e35ad1c121f102fa01a
-
SHA256
73efef6e19126d0e6f020e67c127acc993072f57483c77bad3031b369e2c8342
-
SHA512
f749b2a8adfad9b339e1a2ebc7d4e937cd02c7f9a22dddb596b8f5e878f3fff617981169d0cc4064e8660f80a4ea49577be758c0c048c309f82c2a6b6841b582
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 816 command.exe -
Loads dropped DLL 2 IoCs
pid Process 3024 2024-01-26_f20e3398ae2daac19a6c61bb730ba843_icedid.exe 3024 2024-01-26_f20e3398ae2daac19a6c61bb730ba843_icedid.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Call\command.exe 2024-01-26_f20e3398ae2daac19a6c61bb730ba843_icedid.exe File opened for modification C:\Program Files\Call\command.exe 2024-01-26_f20e3398ae2daac19a6c61bb730ba843_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3024 2024-01-26_f20e3398ae2daac19a6c61bb730ba843_icedid.exe 3024 2024-01-26_f20e3398ae2daac19a6c61bb730ba843_icedid.exe 3024 2024-01-26_f20e3398ae2daac19a6c61bb730ba843_icedid.exe 3024 2024-01-26_f20e3398ae2daac19a6c61bb730ba843_icedid.exe 816 command.exe 816 command.exe 816 command.exe 816 command.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3024 wrote to memory of 816 3024 2024-01-26_f20e3398ae2daac19a6c61bb730ba843_icedid.exe 28 PID 3024 wrote to memory of 816 3024 2024-01-26_f20e3398ae2daac19a6c61bb730ba843_icedid.exe 28 PID 3024 wrote to memory of 816 3024 2024-01-26_f20e3398ae2daac19a6c61bb730ba843_icedid.exe 28 PID 3024 wrote to memory of 816 3024 2024-01-26_f20e3398ae2daac19a6c61bb730ba843_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_f20e3398ae2daac19a6c61bb730ba843_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-26_f20e3398ae2daac19a6c61bb730ba843_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Program Files\Call\command.exe"C:\Program Files\Call\command.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:816
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312KB
MD5655fd7e63f022a9414bfaf96a950d01e
SHA177d8e1962aaed82555da7ec46e2df38f90445f1a
SHA2569970112f871e4ef31cb98e618b1d6cf18044e8ec58062942e857218587a91b22
SHA512a14e7da1561686fda29ab8ba2d254c632d0d94f7e0508527da908dbeb8fc042c058153e666e635b9a2dffade450d1618554973c724634485b05f85da7dd14354