Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/01/2024, 12:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-29_7339438f345b4e9cce36b8131c8bf8c3_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-29_7339438f345b4e9cce36b8131c8bf8c3_icedid.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-29_7339438f345b4e9cce36b8131c8bf8c3_icedid.exe
-
Size
426KB
-
MD5
7339438f345b4e9cce36b8131c8bf8c3
-
SHA1
b89d363fcac20da95334a8a476723c7118fca24e
-
SHA256
346902022481fb31a5f81443de82feb77f25c4aef7bf0e69646ce2175ddd4ef7
-
SHA512
d5fdf916eb190e3168b4af0aa2f63324221136dd258bfb21bc1ed4df020a7ed63d567d8e224bc8ac6147a047deb8255cd966f332943597e2281a07da31319c3c
-
SSDEEP
12288:mplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:CxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2856 Version.exe -
Loads dropped DLL 2 IoCs
pid Process 2268 2024-01-29_7339438f345b4e9cce36b8131c8bf8c3_icedid.exe 2268 2024-01-29_7339438f345b4e9cce36b8131c8bf8c3_icedid.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Installed\Version.exe 2024-01-29_7339438f345b4e9cce36b8131c8bf8c3_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2268 2024-01-29_7339438f345b4e9cce36b8131c8bf8c3_icedid.exe 2268 2024-01-29_7339438f345b4e9cce36b8131c8bf8c3_icedid.exe 2268 2024-01-29_7339438f345b4e9cce36b8131c8bf8c3_icedid.exe 2268 2024-01-29_7339438f345b4e9cce36b8131c8bf8c3_icedid.exe 2856 Version.exe 2856 Version.exe 2856 Version.exe 2856 Version.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2856 2268 2024-01-29_7339438f345b4e9cce36b8131c8bf8c3_icedid.exe 28 PID 2268 wrote to memory of 2856 2268 2024-01-29_7339438f345b4e9cce36b8131c8bf8c3_icedid.exe 28 PID 2268 wrote to memory of 2856 2268 2024-01-29_7339438f345b4e9cce36b8131c8bf8c3_icedid.exe 28 PID 2268 wrote to memory of 2856 2268 2024-01-29_7339438f345b4e9cce36b8131c8bf8c3_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-29_7339438f345b4e9cce36b8131c8bf8c3_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-29_7339438f345b4e9cce36b8131c8bf8c3_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Program Files\Installed\Version.exe"C:\Program Files\Installed\Version.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2856
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
426KB
MD5818610c07c59b2dbba304f4329c6a1ce
SHA10702cd8560a6da0a9b16d137e2919963e5603066
SHA256ccd48646a6dbd52f2c595f60699f5f54b7e3d680d4f24244869a7dfa0158c09e
SHA512ce7905cd782a3abfb2e56ed0be28d65575104481524e1357c0e166c09d988d877ee2e0d9a4191b770ef6913fe9b9c65ea18a08155949a04090245b2c7307004c