Analysis
-
max time kernel
119s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/02/2024, 06:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-14_fdf06bdb7b43aef0cc382e685099ee39_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-14_fdf06bdb7b43aef0cc382e685099ee39_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-14_fdf06bdb7b43aef0cc382e685099ee39_icedid.exe
-
Size
317KB
-
MD5
fdf06bdb7b43aef0cc382e685099ee39
-
SHA1
73c31850ec85d280ed131959b8257fbb45be4cd0
-
SHA256
bbc325afa594452dfdb4659855310e966cd326d30d1a652b710f08bc094c619f
-
SHA512
fe5c0998f689aa5a029ce8a3f2a5fa62d4976cd25b0f6460a4ce50317bba3de924d43382afa270665156611a7a605c0f379a4d217275ad67d3d66dc15bbe9e4e
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2736 Installed.exe -
Loads dropped DLL 4 IoCs
pid Process 2680 2024-02-14_fdf06bdb7b43aef0cc382e685099ee39_icedid.exe 2736 Installed.exe 2736 Installed.exe 2736 Installed.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\Checking\Installed.exe 2024-02-14_fdf06bdb7b43aef0cc382e685099ee39_icedid.exe File created C:\Program Files\Checking\Installed.exe 2024-02-14_fdf06bdb7b43aef0cc382e685099ee39_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2680 2024-02-14_fdf06bdb7b43aef0cc382e685099ee39_icedid.exe 2680 2024-02-14_fdf06bdb7b43aef0cc382e685099ee39_icedid.exe 2680 2024-02-14_fdf06bdb7b43aef0cc382e685099ee39_icedid.exe 2680 2024-02-14_fdf06bdb7b43aef0cc382e685099ee39_icedid.exe 2736 Installed.exe 2736 Installed.exe 2736 Installed.exe 2736 Installed.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2736 2680 2024-02-14_fdf06bdb7b43aef0cc382e685099ee39_icedid.exe 27 PID 2680 wrote to memory of 2736 2680 2024-02-14_fdf06bdb7b43aef0cc382e685099ee39_icedid.exe 27 PID 2680 wrote to memory of 2736 2680 2024-02-14_fdf06bdb7b43aef0cc382e685099ee39_icedid.exe 27 PID 2680 wrote to memory of 2736 2680 2024-02-14_fdf06bdb7b43aef0cc382e685099ee39_icedid.exe 27 PID 2680 wrote to memory of 2736 2680 2024-02-14_fdf06bdb7b43aef0cc382e685099ee39_icedid.exe 27 PID 2680 wrote to memory of 2736 2680 2024-02-14_fdf06bdb7b43aef0cc382e685099ee39_icedid.exe 27 PID 2680 wrote to memory of 2736 2680 2024-02-14_fdf06bdb7b43aef0cc382e685099ee39_icedid.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-14_fdf06bdb7b43aef0cc382e685099ee39_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-14_fdf06bdb7b43aef0cc382e685099ee39_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files\Checking\Installed.exe"C:\Program Files\Checking\Installed.exe" "33201"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2736
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
317KB
MD5cc0089a88add8a023de8aa4e0d8af4eb
SHA1dd541bb24245bb9d4a1459148791f202c19202f6
SHA256414441bda9049711d0ad8d8521af31427b6ac57857d2015335ae963e9df5841b
SHA512ab7bd1fe5562a95139fd69cf5f3345e416788df813f970faf7910ab5e83f890aa3e5fbbb3a2aad0a26709374f5de83213ccef71de6667183f7934ae4a78315a1