Analysis
-
max time kernel
98s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-02-2024 20:08
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-12_981577bcaef1af31121c08b7f2aec551_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-12_981577bcaef1af31121c08b7f2aec551_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-12_981577bcaef1af31121c08b7f2aec551_icedid.exe
-
Size
383KB
-
MD5
981577bcaef1af31121c08b7f2aec551
-
SHA1
6cdbf997d0caf8e46dece917ab14eb3c57b77bb6
-
SHA256
54d1ac6a447e752db74a51d11fd0a3030a47316ec70f7d99959861a31895464e
-
SHA512
2c8eb1c5f1498e0b8a6b086ff9cf813d154eefd187eefeb43d248e5222410327e130b4b9b8e94bc51fee90244ee726e35972cd48b2cc128889b24c8f2e0d78d7
-
SSDEEP
6144:fplrlbbDdQaqd2X/96fr3KFEUGjr8uB2WgcA0cpXEVNrvGZ4FUqm6:fplrVbDdQaqdS/ofraFErH8uB2Wm0SXj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
requires.exepid process 4852 requires.exe -
Drops file in Program Files directory 1 IoCs
Processes:
2024-02-12_981577bcaef1af31121c08b7f2aec551_icedid.exedescription ioc process File created C:\Program Files\meter\requires.exe 2024-02-12_981577bcaef1af31121c08b7f2aec551_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
2024-02-12_981577bcaef1af31121c08b7f2aec551_icedid.exerequires.exepid process 424 2024-02-12_981577bcaef1af31121c08b7f2aec551_icedid.exe 424 2024-02-12_981577bcaef1af31121c08b7f2aec551_icedid.exe 424 2024-02-12_981577bcaef1af31121c08b7f2aec551_icedid.exe 424 2024-02-12_981577bcaef1af31121c08b7f2aec551_icedid.exe 4852 requires.exe 4852 requires.exe 4852 requires.exe 4852 requires.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
2024-02-12_981577bcaef1af31121c08b7f2aec551_icedid.exedescription pid process target process PID 424 wrote to memory of 4852 424 2024-02-12_981577bcaef1af31121c08b7f2aec551_icedid.exe requires.exe PID 424 wrote to memory of 4852 424 2024-02-12_981577bcaef1af31121c08b7f2aec551_icedid.exe requires.exe PID 424 wrote to memory of 4852 424 2024-02-12_981577bcaef1af31121c08b7f2aec551_icedid.exe requires.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-12_981577bcaef1af31121c08b7f2aec551_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-12_981577bcaef1af31121c08b7f2aec551_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:424 -
C:\Program Files\meter\requires.exe"C:\Program Files\meter\requires.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4852
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
383KB
MD51bf8b705d11cad9e7948098745dd433c
SHA109c22639d0a1dd162d39e54d41c4ce789bc4684f
SHA2567473c5b0ab491a1e59d4f8590a78f8ffc4e31970bc6a186bde07b9427fa1854f
SHA5121f0b4783652327c9e8515732f9c4fe68d578c52a5649021fe63b3ab8f2ad511215c028b37e267fffb62b4093b1f080061fec8def96787d4416ff64f0628dc674