Analysis
-
max time kernel
91s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 13:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-12_573a4f7a842e9f97a12f048f5ae072fd_icedid.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-12_573a4f7a842e9f97a12f048f5ae072fd_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-12_573a4f7a842e9f97a12f048f5ae072fd_icedid.exe
-
Size
277KB
-
MD5
573a4f7a842e9f97a12f048f5ae072fd
-
SHA1
c435d64eff45a4a384a208a21ab4e387021844d5
-
SHA256
3ace4897825f86d7cde15de4c8d0a04f285744ad7b486b73c6615df97efb5199
-
SHA512
b4efd8ec51a759864ad6488c773c5c6d72eb12ff45aff79278a03d56e1597af7153ac3a3509e0a9faac4e7656c58d0df3f40cd8eca3405aec0dc2d17c9298612
-
SSDEEP
3072:lxUm75Fku3eKeO213SJReOqdmErj+HyHnNVIPL/+ybbiW1u46Q7qV3lU8xM:fU8Dk11CJ1qDWUNVIT/bblS9x
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1164 that.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\games\that.exe 2024-02-12_573a4f7a842e9f97a12f048f5ae072fd_icedid.exe File opened for modification C:\Program Files\games\that.exe 2024-02-12_573a4f7a842e9f97a12f048f5ae072fd_icedid.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1004 3804 WerFault.exe 48 1608 3804 WerFault.exe 48 -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3804 2024-02-12_573a4f7a842e9f97a12f048f5ae072fd_icedid.exe 3804 2024-02-12_573a4f7a842e9f97a12f048f5ae072fd_icedid.exe 3804 2024-02-12_573a4f7a842e9f97a12f048f5ae072fd_icedid.exe 3804 2024-02-12_573a4f7a842e9f97a12f048f5ae072fd_icedid.exe 1164 that.exe 1164 that.exe 1164 that.exe 1164 that.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3804 wrote to memory of 1164 3804 2024-02-12_573a4f7a842e9f97a12f048f5ae072fd_icedid.exe 85 PID 3804 wrote to memory of 1164 3804 2024-02-12_573a4f7a842e9f97a12f048f5ae072fd_icedid.exe 85 PID 3804 wrote to memory of 1164 3804 2024-02-12_573a4f7a842e9f97a12f048f5ae072fd_icedid.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-12_573a4f7a842e9f97a12f048f5ae072fd_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-12_573a4f7a842e9f97a12f048f5ae072fd_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Program Files\games\that.exe"C:\Program Files\games\that.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3804 -s 10082⤵
- Program crash
PID:1004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3804 -s 10922⤵
- Program crash
PID:1608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3804 -ip 38041⤵PID:3572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3804 -ip 38041⤵PID:5044
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
277KB
MD50ff115f8f66171e6974f36d554d48bba
SHA1f6056291d4eb13b56b3fa3d6171ff6d09700a81c
SHA256b747fe37125a203b4894cc436f122b84956cecec19ff5674d44a2132b1b4d81e
SHA512f2431d7c5e268b5a8a28e1aed45863aa9808391faff8efa4dd8274c07a3218532ffa9c8a997683ad6fbdbbdcd73b674b8af189c6dca2be517380e9cebaf3b013