Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/01/2024, 19:22
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-26_024efecf0a0f2b755e728e1314afa246_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-26_024efecf0a0f2b755e728e1314afa246_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-26_024efecf0a0f2b755e728e1314afa246_icedid.exe
-
Size
315KB
-
MD5
024efecf0a0f2b755e728e1314afa246
-
SHA1
a33ddd2ee2335ed5b402d12ef47a41df66b061c0
-
SHA256
e1f14543805ace04043b5ea0c9ae72ea1c5a4af2dc7e57868cb3e89e8fa29e5d
-
SHA512
cd2bfeae72939e634e3b6d2a64d2880158fd7b7ac8cc836529a48d009b3ea418a06579c110421a61c8977776aa7375ebb7d5f339904b4caffc205784e6c3f61f
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1312 skipto.exe -
Loads dropped DLL 2 IoCs
pid Process 2236 2024-01-26_024efecf0a0f2b755e728e1314afa246_icedid.exe 2236 2024-01-26_024efecf0a0f2b755e728e1314afa246_icedid.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Framework\skipto.exe 2024-01-26_024efecf0a0f2b755e728e1314afa246_icedid.exe File opened for modification C:\Program Files\Framework\skipto.exe 2024-01-26_024efecf0a0f2b755e728e1314afa246_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2236 2024-01-26_024efecf0a0f2b755e728e1314afa246_icedid.exe 2236 2024-01-26_024efecf0a0f2b755e728e1314afa246_icedid.exe 2236 2024-01-26_024efecf0a0f2b755e728e1314afa246_icedid.exe 2236 2024-01-26_024efecf0a0f2b755e728e1314afa246_icedid.exe 1312 skipto.exe 1312 skipto.exe 1312 skipto.exe 1312 skipto.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 1312 2236 2024-01-26_024efecf0a0f2b755e728e1314afa246_icedid.exe 28 PID 2236 wrote to memory of 1312 2236 2024-01-26_024efecf0a0f2b755e728e1314afa246_icedid.exe 28 PID 2236 wrote to memory of 1312 2236 2024-01-26_024efecf0a0f2b755e728e1314afa246_icedid.exe 28 PID 2236 wrote to memory of 1312 2236 2024-01-26_024efecf0a0f2b755e728e1314afa246_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_024efecf0a0f2b755e728e1314afa246_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-26_024efecf0a0f2b755e728e1314afa246_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files\Framework\skipto.exe"C:\Program Files\Framework\skipto.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1312
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
315KB
MD50f3ed0a87a84a9bec2a464cd260b8d0a
SHA1eb014f9a012a1a136b580d1d5f39cd9e812a0eb4
SHA256cd18a30aea0621171a8d500f6c090525e7d9f1682a5b37d728408541b2b00d61
SHA512952daf7288dc10c1b4a1cef75c9de8a2976300c0465cfcf9cb768a4baf247052d57728890c080e0b6207bd9bc3e32792cff72a9ad729f700d720254d3903a45c