Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2024 20:57
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-02_d18df05f411a69fc97083509feabe0ac_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-02_d18df05f411a69fc97083509feabe0ac_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-02_d18df05f411a69fc97083509feabe0ac_icedid.exe
-
Size
384KB
-
MD5
d18df05f411a69fc97083509feabe0ac
-
SHA1
0b7894eb166f3cd456209fc9623a09547cce366a
-
SHA256
3087fe8d9471b5a525008509c8023ac99f5544bdf1014b1ebe886b2a8028291f
-
SHA512
c3853437508d0e657664945db9d87294ccbdaa070c08e708bce3dc1b15881ae6c6b6f4891e10413f0ea7e439ce9098f14a47a21c672d1b6c7fe110b2e94293cf
-
SSDEEP
12288:QplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:sxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4388 Dsetup1.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\contain\Dsetup1.exe 2024-02-02_d18df05f411a69fc97083509feabe0ac_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4504 2024-02-02_d18df05f411a69fc97083509feabe0ac_icedid.exe 4504 2024-02-02_d18df05f411a69fc97083509feabe0ac_icedid.exe 4504 2024-02-02_d18df05f411a69fc97083509feabe0ac_icedid.exe 4504 2024-02-02_d18df05f411a69fc97083509feabe0ac_icedid.exe 4388 Dsetup1.exe 4388 Dsetup1.exe 4388 Dsetup1.exe 4388 Dsetup1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4504 wrote to memory of 4388 4504 2024-02-02_d18df05f411a69fc97083509feabe0ac_icedid.exe 84 PID 4504 wrote to memory of 4388 4504 2024-02-02_d18df05f411a69fc97083509feabe0ac_icedid.exe 84 PID 4504 wrote to memory of 4388 4504 2024-02-02_d18df05f411a69fc97083509feabe0ac_icedid.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-02_d18df05f411a69fc97083509feabe0ac_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-02_d18df05f411a69fc97083509feabe0ac_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Program Files\contain\Dsetup1.exe"C:\Program Files\contain\Dsetup1.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4388
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD56a04ab0fe6639474e0af255e334f528b
SHA1f491e0d265fc4a7f7bb4d5822be8b138eebd817c
SHA256d093eb2491747b8f1951a70eacdde251db5cf65b8db30925fb1aba54f7503fb2
SHA5125bdc153ddebad7d7d3cd0d4bfaf6d5064e04486fa15b133aa66eecac845785aeb9e5772203f5e1a274c455381234288c1bea2763e22dc15220dabeaff0964677