Analysis
-
max time kernel
90s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
28/01/2024, 00:22
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-28_0b735d6b2d15b8ffebda8d97719a84d5_icedid.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-28_0b735d6b2d15b8ffebda8d97719a84d5_icedid.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-28_0b735d6b2d15b8ffebda8d97719a84d5_icedid.exe
-
Size
313KB
-
MD5
0b735d6b2d15b8ffebda8d97719a84d5
-
SHA1
a8f649907e9c65ee28886d88c5f412dcc90654fd
-
SHA256
0bc40e64634d9fb85042c1d9271e96846df2234013379ef4ef768957232802a9
-
SHA512
c4db4e5dfa86e2b793adff76ad6cffbf771f83760d0ec67ede96ba1bd4bf210c74f6a5a759c962d6f7a6950f3e42359d805c84cd554afeff33f2d26b7a56f310
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1508 option.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\commandline\option.exe 2024-01-28_0b735d6b2d15b8ffebda8d97719a84d5_icedid.exe File opened for modification C:\Program Files\commandline\option.exe 2024-01-28_0b735d6b2d15b8ffebda8d97719a84d5_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1604 2024-01-28_0b735d6b2d15b8ffebda8d97719a84d5_icedid.exe 1604 2024-01-28_0b735d6b2d15b8ffebda8d97719a84d5_icedid.exe 1604 2024-01-28_0b735d6b2d15b8ffebda8d97719a84d5_icedid.exe 1604 2024-01-28_0b735d6b2d15b8ffebda8d97719a84d5_icedid.exe 1508 option.exe 1508 option.exe 1508 option.exe 1508 option.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1604 wrote to memory of 1508 1604 2024-01-28_0b735d6b2d15b8ffebda8d97719a84d5_icedid.exe 84 PID 1604 wrote to memory of 1508 1604 2024-01-28_0b735d6b2d15b8ffebda8d97719a84d5_icedid.exe 84 PID 1604 wrote to memory of 1508 1604 2024-01-28_0b735d6b2d15b8ffebda8d97719a84d5_icedid.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-28_0b735d6b2d15b8ffebda8d97719a84d5_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-28_0b735d6b2d15b8ffebda8d97719a84d5_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Program Files\commandline\option.exe"C:\Program Files\commandline\option.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1508
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
314KB
MD549fed16d16742abf6d49abcb655c4b82
SHA139171cb032699e833ed8ba017ffefc11bfdd198d
SHA2560ab4fff5b0ee9b1cffe73855c4e66043ed983c95ac03e16a4e012ed318c9da33
SHA5125b07340189d31fecbcbbe6749255ae29aa1ab59bcada78d658d229de8cd830ef4bddd8a454e57bdda3c7c1fcbd3abb2f502d7ae68fce6110f46511428b1b9b4e