Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-02-2024 19:54
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-12_3c6147ca51cd8a6c1268366c9c983bf4_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-12_3c6147ca51cd8a6c1268366c9c983bf4_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-12_3c6147ca51cd8a6c1268366c9c983bf4_icedid.exe
-
Size
312KB
-
MD5
3c6147ca51cd8a6c1268366c9c983bf4
-
SHA1
da2e33f686baae06ed5f2fea68f3dbe037d86cd1
-
SHA256
5a04d3758cd603981320fc216798bafc85dd2b253aafdd493ea61830ecbbeed4
-
SHA512
38775eae2bd439a2dbfd9ed1907ac6684646b46b94c8263da3e1386e44856060de7b542973a29087b3b454fcc5852e7ba3c19ae1a4412dc81c993eaa0a27a2a9
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
released.exepid process 1200 released.exe -
Drops file in Program Files directory 2 IoCs
Processes:
2024-02-12_3c6147ca51cd8a6c1268366c9c983bf4_icedid.exedescription ioc process File created C:\Program Files\Dependency\released.exe 2024-02-12_3c6147ca51cd8a6c1268366c9c983bf4_icedid.exe File opened for modification C:\Program Files\Dependency\released.exe 2024-02-12_3c6147ca51cd8a6c1268366c9c983bf4_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
2024-02-12_3c6147ca51cd8a6c1268366c9c983bf4_icedid.exereleased.exepid process 4080 2024-02-12_3c6147ca51cd8a6c1268366c9c983bf4_icedid.exe 4080 2024-02-12_3c6147ca51cd8a6c1268366c9c983bf4_icedid.exe 4080 2024-02-12_3c6147ca51cd8a6c1268366c9c983bf4_icedid.exe 4080 2024-02-12_3c6147ca51cd8a6c1268366c9c983bf4_icedid.exe 1200 released.exe 1200 released.exe 1200 released.exe 1200 released.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
2024-02-12_3c6147ca51cd8a6c1268366c9c983bf4_icedid.exedescription pid process target process PID 4080 wrote to memory of 1200 4080 2024-02-12_3c6147ca51cd8a6c1268366c9c983bf4_icedid.exe released.exe PID 4080 wrote to memory of 1200 4080 2024-02-12_3c6147ca51cd8a6c1268366c9c983bf4_icedid.exe released.exe PID 4080 wrote to memory of 1200 4080 2024-02-12_3c6147ca51cd8a6c1268366c9c983bf4_icedid.exe released.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-12_3c6147ca51cd8a6c1268366c9c983bf4_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-12_3c6147ca51cd8a6c1268366c9c983bf4_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Program Files\Dependency\released.exe"C:\Program Files\Dependency\released.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1200
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312KB
MD5775d37e04d95333c57bf052743c26009
SHA1f25f0aa9683f886f91c493a54398088b333fee9f
SHA256b675245296b8503768972367c98f5be69abd194c19a369c5984f0fc57e5a7193
SHA5125dc3c8206096f32f62b319c9650cd1ef1ae0f1171223935549728f1599310695ebf1f0c436a07b5bdb478205ba8562125699f260298df7424c7a64d1b3763f7f