Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
27-01-2024 05:23
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-27_2124d52a52e198afa8f1a0109b2070cb_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-27_2124d52a52e198afa8f1a0109b2070cb_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-27_2124d52a52e198afa8f1a0109b2070cb_icedid.exe
-
Size
425KB
-
MD5
2124d52a52e198afa8f1a0109b2070cb
-
SHA1
8cfc1847a62c19570482f2eb0a6df77822471540
-
SHA256
05a5b512d4de7bf8be96dbb436cee5355d96cb78f2f98cf789ddc30f0e082590
-
SHA512
7690b30365450181a2f8412462f5c7721438497d2e01377e65d1d62643500bc951b495ec0dd70523b2496c02f7512bcdfa394d1a993309ab2d9b65eb760f0e7b
-
SSDEEP
12288:0plrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:wxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1224 download.exe -
Loads dropped DLL 2 IoCs
pid Process 2236 2024-01-27_2124d52a52e198afa8f1a0109b2070cb_icedid.exe 2236 2024-01-27_2124d52a52e198afa8f1a0109b2070cb_icedid.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\locations\download.exe 2024-01-27_2124d52a52e198afa8f1a0109b2070cb_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2236 2024-01-27_2124d52a52e198afa8f1a0109b2070cb_icedid.exe 2236 2024-01-27_2124d52a52e198afa8f1a0109b2070cb_icedid.exe 2236 2024-01-27_2124d52a52e198afa8f1a0109b2070cb_icedid.exe 2236 2024-01-27_2124d52a52e198afa8f1a0109b2070cb_icedid.exe 1224 download.exe 1224 download.exe 1224 download.exe 1224 download.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 1224 2236 2024-01-27_2124d52a52e198afa8f1a0109b2070cb_icedid.exe 28 PID 2236 wrote to memory of 1224 2236 2024-01-27_2124d52a52e198afa8f1a0109b2070cb_icedid.exe 28 PID 2236 wrote to memory of 1224 2236 2024-01-27_2124d52a52e198afa8f1a0109b2070cb_icedid.exe 28 PID 2236 wrote to memory of 1224 2236 2024-01-27_2124d52a52e198afa8f1a0109b2070cb_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-27_2124d52a52e198afa8f1a0109b2070cb_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-27_2124d52a52e198afa8f1a0109b2070cb_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files\locations\download.exe"C:\Program Files\locations\download.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1224
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425KB
MD5d31a3c76d12e9efd1ae6e1ff2ae9a2aa
SHA1796ffedf9096e12c04770c3b58d70a24e21d80a0
SHA256a230d25d6acabd711ca9d196aa55bc0b731d6a1988c3b8585abf500f44fe0b71
SHA512290f2b1b053686ff75329c271c2ccd76c2537e853e5a9c3abc90741eb6f89483607cc9e991983b2b18aae721cd636d499ee90c051a6d56252a851369568bfa48