Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2024 04:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-29_595c0856fa614ba0e9018acf0bbbfc33_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-29_595c0856fa614ba0e9018acf0bbbfc33_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-29_595c0856fa614ba0e9018acf0bbbfc33_icedid.exe
-
Size
389KB
-
MD5
595c0856fa614ba0e9018acf0bbbfc33
-
SHA1
d8dc0c20975eb2aba75a5be828b9fd12eaabe5e1
-
SHA256
e72f6bee25a923889f2bd02b0058925bd865eec5c69a5fca07f95c48d44b4259
-
SHA512
82c1af562848a764477213810dc418bcb8095f714e2098124724fc4b70b1607e7de2d81e0df30fb122af89d22ba4d0b882f1afc07283029ad7fa59ab0d164800
-
SSDEEP
12288:9plrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:fxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2888 instead.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\future\instead.exe 2024-01-29_595c0856fa614ba0e9018acf0bbbfc33_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1916 2024-01-29_595c0856fa614ba0e9018acf0bbbfc33_icedid.exe 1916 2024-01-29_595c0856fa614ba0e9018acf0bbbfc33_icedid.exe 1916 2024-01-29_595c0856fa614ba0e9018acf0bbbfc33_icedid.exe 1916 2024-01-29_595c0856fa614ba0e9018acf0bbbfc33_icedid.exe 2888 instead.exe 2888 instead.exe 2888 instead.exe 2888 instead.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2888 1916 2024-01-29_595c0856fa614ba0e9018acf0bbbfc33_icedid.exe 84 PID 1916 wrote to memory of 2888 1916 2024-01-29_595c0856fa614ba0e9018acf0bbbfc33_icedid.exe 84 PID 1916 wrote to memory of 2888 1916 2024-01-29_595c0856fa614ba0e9018acf0bbbfc33_icedid.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-29_595c0856fa614ba0e9018acf0bbbfc33_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-29_595c0856fa614ba0e9018acf0bbbfc33_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Program Files\future\instead.exe"C:\Program Files\future\instead.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2888
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
389KB
MD5d2050fdb916a44d1b156807030fe091a
SHA1bc8cca1716b82d163f3732e9b6be67f340b7e277
SHA256f78a9a12981b9272702e098d722f04527d42f9ee446c7335f4aff36690923370
SHA5124c9e3eba0ebf743c82fc3d17718e87c1ff09d53a6464a5f31b9c74da4aab187c2080420f72c28ec208772c1d65b5c384ea4e824e86c2fa87a609287afa571f3c