Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11-02-2024 23:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-11_7a4aef81ee44d2466988bb3de96334f0_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-11_7a4aef81ee44d2466988bb3de96334f0_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-11_7a4aef81ee44d2466988bb3de96334f0_icedid.exe
-
Size
312KB
-
MD5
7a4aef81ee44d2466988bb3de96334f0
-
SHA1
75f65724e74c03622bca13628d7edfe6a5eef875
-
SHA256
5b12781e7b844eeee1a44a4cb02d92d5ef3c0c4b0cdbaf9b8724365154fc41b8
-
SHA512
b6761177d47a11d043ecef53fdfc636b28ca5c7506ab7f12aa77eddda3616f71fb0006cc2f908b190401b11f5ab1f4e91e768bb180dfa2ab0007577a000b2dc2
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2320 callback.exe -
Loads dropped DLL 2 IoCs
pid Process 2800 2024-02-11_7a4aef81ee44d2466988bb3de96334f0_icedid.exe 2800 2024-02-11_7a4aef81ee44d2466988bb3de96334f0_icedid.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\structures\callback.exe 2024-02-11_7a4aef81ee44d2466988bb3de96334f0_icedid.exe File opened for modification C:\Program Files\structures\callback.exe 2024-02-11_7a4aef81ee44d2466988bb3de96334f0_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2800 2024-02-11_7a4aef81ee44d2466988bb3de96334f0_icedid.exe 2800 2024-02-11_7a4aef81ee44d2466988bb3de96334f0_icedid.exe 2800 2024-02-11_7a4aef81ee44d2466988bb3de96334f0_icedid.exe 2800 2024-02-11_7a4aef81ee44d2466988bb3de96334f0_icedid.exe 2320 callback.exe 2320 callback.exe 2320 callback.exe 2320 callback.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2800 wrote to memory of 2320 2800 2024-02-11_7a4aef81ee44d2466988bb3de96334f0_icedid.exe 28 PID 2800 wrote to memory of 2320 2800 2024-02-11_7a4aef81ee44d2466988bb3de96334f0_icedid.exe 28 PID 2800 wrote to memory of 2320 2800 2024-02-11_7a4aef81ee44d2466988bb3de96334f0_icedid.exe 28 PID 2800 wrote to memory of 2320 2800 2024-02-11_7a4aef81ee44d2466988bb3de96334f0_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-11_7a4aef81ee44d2466988bb3de96334f0_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-11_7a4aef81ee44d2466988bb3de96334f0_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Program Files\structures\callback.exe"C:\Program Files\structures\callback.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2320
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312KB
MD53c971fd2398fb02640eeb1338e6eb0a4
SHA196634903d534245ee53d9cc67cf277094cdaa478
SHA25685b25417d9c3e4da8db8a99e16bc44022e620c61460ac84213d9b9c084bd48b8
SHA5120c0f2836a77b50bc93eb09fac8d929f7d9068689741440cbe064510c49e757e3c633a546d59aa32f2555b0dafd6c1db2d539b978bc9606241c41768dc2fc735c