Analysis
-
max time kernel
142s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 17:36
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-12_56430fa728f006f4c6a2729585774e28_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-12_56430fa728f006f4c6a2729585774e28_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-12_56430fa728f006f4c6a2729585774e28_icedid.exe
-
Size
422KB
-
MD5
56430fa728f006f4c6a2729585774e28
-
SHA1
27d27088bfbb5ea3f6cc69e59af866b959953f55
-
SHA256
f8a924ced13f9c05b8d3cc1ce95551b5a85c909d6251df3d19a5f76ec9f0f68f
-
SHA512
440dbd798999db6088ae8d35f3bce98546037469a905db07f9956bccefd40a141eb58a5a3eb547e6d54e125553a45e49aa483594f530304c5946f43f79269054
-
SSDEEP
12288:rplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:dxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2464 Brazil.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\ortuguese\Brazil.exe 2024-02-12_56430fa728f006f4c6a2729585774e28_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3592 2024-02-12_56430fa728f006f4c6a2729585774e28_icedid.exe 3592 2024-02-12_56430fa728f006f4c6a2729585774e28_icedid.exe 3592 2024-02-12_56430fa728f006f4c6a2729585774e28_icedid.exe 3592 2024-02-12_56430fa728f006f4c6a2729585774e28_icedid.exe 2464 Brazil.exe 2464 Brazil.exe 2464 Brazil.exe 2464 Brazil.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3592 wrote to memory of 2464 3592 2024-02-12_56430fa728f006f4c6a2729585774e28_icedid.exe 83 PID 3592 wrote to memory of 2464 3592 2024-02-12_56430fa728f006f4c6a2729585774e28_icedid.exe 83 PID 3592 wrote to memory of 2464 3592 2024-02-12_56430fa728f006f4c6a2729585774e28_icedid.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-12_56430fa728f006f4c6a2729585774e28_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-12_56430fa728f006f4c6a2729585774e28_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Program Files\ortuguese\Brazil.exe"C:\Program Files\ortuguese\Brazil.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2464
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
422KB
MD57f4fcf6c0985ed9abd4636abcbb7bbfc
SHA1a423bebe4f7f011808c5176dc283d7ec42dbe478
SHA256f0fad39f3c74e4b6540abc724cf2540aa9dff606060f9a7aa3b249fc5883945a
SHA512e23c8ea85276eb93a7385fa27b88cf7eb0c7b03018e5484d9293fe7d2fa6144148ea372ae1fbd629d49712fc8d949aa4de8b9f652620e5be4a65168c2d7aa003