Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 00:39
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-13_9f2fee6d0b813c08d3af7604b0ac7bd0_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-13_9f2fee6d0b813c08d3af7604b0ac7bd0_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-13_9f2fee6d0b813c08d3af7604b0ac7bd0_icedid.exe
-
Size
265KB
-
MD5
9f2fee6d0b813c08d3af7604b0ac7bd0
-
SHA1
21ce5f478912838f8def740e017fd3588028c695
-
SHA256
ab92ed0e93da40aa5b2fb730e391b1d391f4dac05f6c20716858f21dcdacdcb2
-
SHA512
6697329339a91084ba73b87a3c06a166296bee3172f99c0c32d54004c4909f31c7e473070a0d16ba402a726708d6f4d14a957010596076ba99af1bbf3b8f1e66
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2420 Morgan.exe -
Loads dropped DLL 2 IoCs
pid Process 2864 2024-02-13_9f2fee6d0b813c08d3af7604b0ac7bd0_icedid.exe 2864 2024-02-13_9f2fee6d0b813c08d3af7604b0ac7bd0_icedid.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\topics\Morgan.exe 2024-02-13_9f2fee6d0b813c08d3af7604b0ac7bd0_icedid.exe File opened for modification C:\Program Files\topics\Morgan.exe 2024-02-13_9f2fee6d0b813c08d3af7604b0ac7bd0_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2864 2024-02-13_9f2fee6d0b813c08d3af7604b0ac7bd0_icedid.exe 2864 2024-02-13_9f2fee6d0b813c08d3af7604b0ac7bd0_icedid.exe 2864 2024-02-13_9f2fee6d0b813c08d3af7604b0ac7bd0_icedid.exe 2864 2024-02-13_9f2fee6d0b813c08d3af7604b0ac7bd0_icedid.exe 2420 Morgan.exe 2420 Morgan.exe 2420 Morgan.exe 2420 Morgan.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2420 2864 2024-02-13_9f2fee6d0b813c08d3af7604b0ac7bd0_icedid.exe 28 PID 2864 wrote to memory of 2420 2864 2024-02-13_9f2fee6d0b813c08d3af7604b0ac7bd0_icedid.exe 28 PID 2864 wrote to memory of 2420 2864 2024-02-13_9f2fee6d0b813c08d3af7604b0ac7bd0_icedid.exe 28 PID 2864 wrote to memory of 2420 2864 2024-02-13_9f2fee6d0b813c08d3af7604b0ac7bd0_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_9f2fee6d0b813c08d3af7604b0ac7bd0_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-13_9f2fee6d0b813c08d3af7604b0ac7bd0_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Program Files\topics\Morgan.exe"C:\Program Files\topics\Morgan.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2420
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
265KB
MD5579c11756545e16a5ef50bdeab7f19e3
SHA1fc0f02dbd4a47920124ae976ff52f8222aa9b442
SHA256198c1dd3b9c51d29c0bc6ff898f71be4e3bf03fdd0fabcbbd00c5508c9fb2e34
SHA51257da0767dfe358f38da098b4148f805fd0f0ca5a4a382cdb35125c5bd05589a24ccd75debb4eb5bb33e5b74e3eec186110ae3eb9e2b544b7ca485821eaf27f7b