Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
27/01/2024, 03:45
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-27_bb43cf9b66b8045587d254f36855b8f7_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-27_bb43cf9b66b8045587d254f36855b8f7_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-27_bb43cf9b66b8045587d254f36855b8f7_icedid.exe
-
Size
312KB
-
MD5
bb43cf9b66b8045587d254f36855b8f7
-
SHA1
8eaf75bc99be22d7c9b1be47fec696dedcb4f5a7
-
SHA256
4963574d785ca52948f8317fe5368f61a2c388cfdf5b7e0384a1ed3ab00535ff
-
SHA512
9c24e85d923c12e733f2697abd100b618c2f19bfa9db13cc85912af2fa706532a4ec973573cb281f871896fd03aabcc68b490db721196dd726b2cd43121271f2
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2148 previous.exe -
Loads dropped DLL 2 IoCs
pid Process 1984 2024-01-27_bb43cf9b66b8045587d254f36855b8f7_icedid.exe 1984 2024-01-27_bb43cf9b66b8045587d254f36855b8f7_icedid.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\instead\previous.exe 2024-01-27_bb43cf9b66b8045587d254f36855b8f7_icedid.exe File opened for modification C:\Program Files\instead\previous.exe 2024-01-27_bb43cf9b66b8045587d254f36855b8f7_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1984 2024-01-27_bb43cf9b66b8045587d254f36855b8f7_icedid.exe 1984 2024-01-27_bb43cf9b66b8045587d254f36855b8f7_icedid.exe 1984 2024-01-27_bb43cf9b66b8045587d254f36855b8f7_icedid.exe 1984 2024-01-27_bb43cf9b66b8045587d254f36855b8f7_icedid.exe 2148 previous.exe 2148 previous.exe 2148 previous.exe 2148 previous.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2148 1984 2024-01-27_bb43cf9b66b8045587d254f36855b8f7_icedid.exe 28 PID 1984 wrote to memory of 2148 1984 2024-01-27_bb43cf9b66b8045587d254f36855b8f7_icedid.exe 28 PID 1984 wrote to memory of 2148 1984 2024-01-27_bb43cf9b66b8045587d254f36855b8f7_icedid.exe 28 PID 1984 wrote to memory of 2148 1984 2024-01-27_bb43cf9b66b8045587d254f36855b8f7_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-27_bb43cf9b66b8045587d254f36855b8f7_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-27_bb43cf9b66b8045587d254f36855b8f7_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files\instead\previous.exe"C:\Program Files\instead\previous.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2148
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312KB
MD58c9e5332f03aeab181690ce6193f9ec6
SHA16e55b33bcccf2b89ca5ef5d7fea05c384446dbac
SHA256f191ab2f1ef01cf8404a067f767b4e915840e3360840bcc5b97311de6e663316
SHA512931482b5d134785e128c52177322b7c95262d5ef88158c3de2af2fd6b200d0bf7723eb78a8ccb7361054504ad797c1f236181261fdcffa7fef80c8bcf1a4fa07