Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
17/02/2024, 07:31
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-17_44dddd35fc82b027f2176c69487e5814_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-17_44dddd35fc82b027f2176c69487e5814_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-17_44dddd35fc82b027f2176c69487e5814_icedid.exe
-
Size
426KB
-
MD5
44dddd35fc82b027f2176c69487e5814
-
SHA1
21c719bb68594510a0513e92b4d525b1c22c1811
-
SHA256
e0c6d2a003a25c246cc0439ede610d917a456c4fb7137eeb39ecdf9ffc19d3c7
-
SHA512
8e51941b4bd8f061a785570344ffd204a1e47950b0f4b47765b3b9652fb4d25ea6a1b8c081803e465762a3a5ca8b07c488598df94575152d9ebc4d940599f37b
-
SSDEEP
12288:KplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:mxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2396 Typically.exe -
Loads dropped DLL 2 IoCs
pid Process 2120 2024-02-17_44dddd35fc82b027f2176c69487e5814_icedid.exe 2120 2024-02-17_44dddd35fc82b027f2176c69487e5814_icedid.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\entirely\Typically.exe 2024-02-17_44dddd35fc82b027f2176c69487e5814_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2120 2024-02-17_44dddd35fc82b027f2176c69487e5814_icedid.exe 2120 2024-02-17_44dddd35fc82b027f2176c69487e5814_icedid.exe 2120 2024-02-17_44dddd35fc82b027f2176c69487e5814_icedid.exe 2120 2024-02-17_44dddd35fc82b027f2176c69487e5814_icedid.exe 2396 Typically.exe 2396 Typically.exe 2396 Typically.exe 2396 Typically.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2396 2120 2024-02-17_44dddd35fc82b027f2176c69487e5814_icedid.exe 28 PID 2120 wrote to memory of 2396 2120 2024-02-17_44dddd35fc82b027f2176c69487e5814_icedid.exe 28 PID 2120 wrote to memory of 2396 2120 2024-02-17_44dddd35fc82b027f2176c69487e5814_icedid.exe 28 PID 2120 wrote to memory of 2396 2120 2024-02-17_44dddd35fc82b027f2176c69487e5814_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-17_44dddd35fc82b027f2176c69487e5814_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-17_44dddd35fc82b027f2176c69487e5814_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files\entirely\Typically.exe"C:\Program Files\entirely\Typically.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2396
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
426KB
MD53a3dcebbdd209f0606e8692f596ee4bb
SHA1af0d19ecb01585dd3bed2168eb9a47d0b1773e6e
SHA256e8453afb00be5d288d2876e1067b01cc8febe23c04967b3ba9f60ab77a87995a
SHA512d58e6c660cd48ee60e11945df7a0189029e888782adb9e20c0ee10618b254e3bbdd66dac7a2c3bb84118ac04850855bff1702076b4842216d491d0e4cf60679d