Analysis
-
max time kernel
147s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
02/02/2024, 07:48
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-02_676d66435bbe899f7c53de8b4729c471_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-02_676d66435bbe899f7c53de8b4729c471_icedid.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-02_676d66435bbe899f7c53de8b4729c471_icedid.exe
-
Size
701KB
-
MD5
676d66435bbe899f7c53de8b4729c471
-
SHA1
a1b2186b40c06d96633069c741dd2cf3fb6d35f3
-
SHA256
b12810726fbd344b28ad8906c84737c648e978d584e7d90e035dca070d2a1e06
-
SHA512
d2a57dcb2acf3f6ce2305230c1fa508c23e1535e34fd614145e9da4eb8d0b86a5f3dd7e0664bb562349630cc3295b6de0692d016d99ff6669e0729b74e5940b2
-
SSDEEP
12288:p7bSAcO9nmofU3f5JblvsXWhW3FPOlNTHlGvYPlP5IzC1fshUQCvLo2k:5HnmlJblvSdFP8THlhqe1kh7
Malware Config
Signatures
-
Detects executables built or packed with MPress PE compressor 12 IoCs
resource yara_rule behavioral1/memory/2340-4-0x0000000000400000-0x000000000040F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2340-6-0x0000000000400000-0x000000000040F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2340-7-0x0000000000400000-0x000000000040F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2340-9-0x0000000000400000-0x000000000040F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2340-11-0x0000000000400000-0x000000000040F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2340-10-0x0000000000400000-0x000000000040F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2340-13-0x0000000000400000-0x000000000040F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2768-35-0x0000000000400000-0x000000000040F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2340-37-0x0000000000400000-0x000000000040F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2768-39-0x0000000000400000-0x000000000040F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2768-41-0x0000000000400000-0x000000000040F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2768-45-0x0000000000400000-0x000000000040F000-memory.dmp INDICATOR_EXE_Packed_MPress -
Deletes itself 1 IoCs
pid Process 2676 WScript.exe -
Executes dropped EXE 2 IoCs
pid Process 2664 fdlaunchersa.exe 2768 fdlaunchersa.exe -
Loads dropped DLL 3 IoCs
pid Process 2664 fdlaunchersa.exe 2664 fdlaunchersa.exe 2768 fdlaunchersa.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2132 set thread context of 2340 2132 2024-02-02_676d66435bbe899f7c53de8b4729c471_icedid.exe 28 PID 2664 set thread context of 2768 2664 fdlaunchersa.exe 30 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\fdlaunchersa.exe 2024-02-02_676d66435bbe899f7c53de8b4729c471_icedid.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\fdlaunchersa.exe 2024-02-02_676d66435bbe899f7c53de8b4729c471_icedid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2340 2024-02-02_676d66435bbe899f7c53de8b4729c471_icedid.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2340 2132 2024-02-02_676d66435bbe899f7c53de8b4729c471_icedid.exe 28 PID 2132 wrote to memory of 2340 2132 2024-02-02_676d66435bbe899f7c53de8b4729c471_icedid.exe 28 PID 2132 wrote to memory of 2340 2132 2024-02-02_676d66435bbe899f7c53de8b4729c471_icedid.exe 28 PID 2132 wrote to memory of 2340 2132 2024-02-02_676d66435bbe899f7c53de8b4729c471_icedid.exe 28 PID 2132 wrote to memory of 2340 2132 2024-02-02_676d66435bbe899f7c53de8b4729c471_icedid.exe 28 PID 2132 wrote to memory of 2340 2132 2024-02-02_676d66435bbe899f7c53de8b4729c471_icedid.exe 28 PID 2132 wrote to memory of 2340 2132 2024-02-02_676d66435bbe899f7c53de8b4729c471_icedid.exe 28 PID 2132 wrote to memory of 2340 2132 2024-02-02_676d66435bbe899f7c53de8b4729c471_icedid.exe 28 PID 2132 wrote to memory of 2340 2132 2024-02-02_676d66435bbe899f7c53de8b4729c471_icedid.exe 28 PID 2664 wrote to memory of 2768 2664 fdlaunchersa.exe 30 PID 2664 wrote to memory of 2768 2664 fdlaunchersa.exe 30 PID 2664 wrote to memory of 2768 2664 fdlaunchersa.exe 30 PID 2664 wrote to memory of 2768 2664 fdlaunchersa.exe 30 PID 2664 wrote to memory of 2768 2664 fdlaunchersa.exe 30 PID 2664 wrote to memory of 2768 2664 fdlaunchersa.exe 30 PID 2664 wrote to memory of 2768 2664 fdlaunchersa.exe 30 PID 2664 wrote to memory of 2768 2664 fdlaunchersa.exe 30 PID 2664 wrote to memory of 2768 2664 fdlaunchersa.exe 30 PID 2340 wrote to memory of 2676 2340 2024-02-02_676d66435bbe899f7c53de8b4729c471_icedid.exe 31 PID 2340 wrote to memory of 2676 2340 2024-02-02_676d66435bbe899f7c53de8b4729c471_icedid.exe 31 PID 2340 wrote to memory of 2676 2340 2024-02-02_676d66435bbe899f7c53de8b4729c471_icedid.exe 31 PID 2340 wrote to memory of 2676 2340 2024-02-02_676d66435bbe899f7c53de8b4729c471_icedid.exe 31 PID 2340 wrote to memory of 2676 2340 2024-02-02_676d66435bbe899f7c53de8b4729c471_icedid.exe 31 PID 2340 wrote to memory of 2676 2340 2024-02-02_676d66435bbe899f7c53de8b4729c471_icedid.exe 31 PID 2340 wrote to memory of 2676 2340 2024-02-02_676d66435bbe899f7c53de8b4729c471_icedid.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-02_676d66435bbe899f7c53de8b4729c471_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-02_676d66435bbe899f7c53de8b4729c471_icedid.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\2024-02-02_676d66435bbe899f7c53de8b4729c471_icedid.exe
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\8002.vbs"3⤵
- Deletes itself
PID:2676
-
-
-
C:\Program Files (x86)\Microsoft SQL Server Compact Edition\fdlaunchersa.exe"C:\Program Files (x86)\Microsoft SQL Server Compact Edition\fdlaunchersa.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Program Files (x86)\Microsoft SQL Server Compact Edition\fdlaunchersa.exe
- Executes dropped EXE
- Loads dropped DLL
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
500B
MD557afaa83e32e314ffb54d838b894da6d
SHA1493a632b267dc65c5cbcf9f9cc0ab498a82c0bec
SHA256191ce9b84e8f7a39f76a54d36c47541e25c47a6d887a21003b5956bdbee9e4e1
SHA51252953fbd5598318b6a92c7d93089304bbb1d65a54fdcbbdb583bc93dbbd3f3ec60c062950f451878e097da652e7d02b0bbcecc8b9c699a917ba07d6546b96008
-
Filesize
1.2MB
MD5e8f4aab48c09793eb2d2c3dcb4d97cff
SHA1ef533d01dcf826e3c7903c7297d9d05fd148ccce
SHA256d4e760945331fd902f7da389aea8f4ba4cb7540f6ec22aec23ff320c8caf3537
SHA512b5f8ac7f48d46ad1cbf75465141ddc9a339e09befd80dae9723a8b30437f18292b77c843a5a4db6e1a4d5da3765550617b6d4ca8893d8ba7326ce776bb446a4d
-
Filesize
254KB
MD529ed245869f7a5a40657c0652ce4b617
SHA19fbf9fb8f060ec9ff1a4a73cfb8175a045450cb9
SHA256d7459a7f404d0fbd59f934f34a65eb8eb75253988974a43d2c809e62a5fab36a
SHA512620308f7132b928d37318bd93db1c0abcc47f11edf252f40802485694055e20358274639791628529151e5e216fe77aca56762edf9d1532f1ce0d0d4ebb2c1e9
-
Filesize
104KB
MD58b83708470e0999b4363a90b52696349
SHA1e156fdd28a4f17ad215eac9de95aa58bcb6e081c
SHA256c3c9a54ba742b551cf006fce34edde8515d95ccad3c4413e7e9f68f3cb6bae04
SHA5129fdf69f01d851fe1d146e41208908ebe488822d1c1d8dc7298462ca63ed23b5f76226e9e96363a73e78576010d8beef11379773dfd6bd1391d84cd42ffb0cdb8
-
Filesize
190KB
MD50a7fbf3c6609750c97f33b822fc36ca2
SHA1ad9afd48fd424e3f65a742c88143e8b921ed0cfe
SHA25607e70e5ce35fb6fba43a36f0dc1cd8f75cb6ac66701f4f5413361bf600abf145
SHA512c54a4cec7d0f28690461ee3019df81e8c3bd2e05c28bca3c8c0719f56cede705f03d535952ab4f1ee7a6334b0d441170274271dd9e0bef296c4fa3c75454ca38
-
Filesize
79KB
MD5bf9de902291627e48bba0bfe785b2a19
SHA179f19fd8189c9685c979e6561b5a64a9d7fedbcb
SHA25642636c9fa01fa8751caa51e2dbe04daec7e67b6f4cfcca2b37c4116bbed98116
SHA51282193ac73ca7e25a86ffa164ddd55e6cb503dbbdcb4803316f1f48d73f80a00ea7857779a5364997ca11256f2b19063d8c764b4b6d50f6e41fe0f7aa61d7464c
-
Filesize
154KB
MD50b94bfe2a18a73768132dbe34e391a14
SHA18da324ab3b507816d2300fc01d8678c186056e88
SHA2569e07b918492aa309a38c49b31857990476e694db3d3a857d7f49bf1e97536b10
SHA51294095cf9ac4e45e9d2e6d4b65a15fd73fa04862f2b141180fafead321d744fa7c9d0fcafb1169f96ba2a4158463094e2133e91352cf6a0661f8de7db363b4065