Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
17/02/2024, 11:33
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-17_666f0c946abd466f1d1d2364f8ac39ae_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-17_666f0c946abd466f1d1d2364f8ac39ae_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-17_666f0c946abd466f1d1d2364f8ac39ae_icedid.exe
-
Size
384KB
-
MD5
666f0c946abd466f1d1d2364f8ac39ae
-
SHA1
27f4b82d8340dc5516e6770925530cf8fd17ac95
-
SHA256
8a7f783adcd1fad1d1ddd138858f5d61499a12e7708ff32934ff3b5d315e255f
-
SHA512
91be35ab99bc6106236dfc1572eb1ca566bc097b15cabb78792334865d759b6088f36773d039e28a766e3c2a37fcf142f00d2df6ecdf7de8f6eec15cb991882d
-
SSDEEP
12288:OplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:6xRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1968 Version.exe -
Loads dropped DLL 2 IoCs
pid Process 2220 2024-02-17_666f0c946abd466f1d1d2364f8ac39ae_icedid.exe 2220 2024-02-17_666f0c946abd466f1d1d2364f8ac39ae_icedid.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Installed\Version.exe 2024-02-17_666f0c946abd466f1d1d2364f8ac39ae_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2220 2024-02-17_666f0c946abd466f1d1d2364f8ac39ae_icedid.exe 2220 2024-02-17_666f0c946abd466f1d1d2364f8ac39ae_icedid.exe 2220 2024-02-17_666f0c946abd466f1d1d2364f8ac39ae_icedid.exe 2220 2024-02-17_666f0c946abd466f1d1d2364f8ac39ae_icedid.exe 1968 Version.exe 1968 Version.exe 1968 Version.exe 1968 Version.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 1968 2220 2024-02-17_666f0c946abd466f1d1d2364f8ac39ae_icedid.exe 28 PID 2220 wrote to memory of 1968 2220 2024-02-17_666f0c946abd466f1d1d2364f8ac39ae_icedid.exe 28 PID 2220 wrote to memory of 1968 2220 2024-02-17_666f0c946abd466f1d1d2364f8ac39ae_icedid.exe 28 PID 2220 wrote to memory of 1968 2220 2024-02-17_666f0c946abd466f1d1d2364f8ac39ae_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-17_666f0c946abd466f1d1d2364f8ac39ae_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-17_666f0c946abd466f1d1d2364f8ac39ae_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files\Installed\Version.exe"C:\Program Files\Installed\Version.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1968
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD569522f07042d8960ebdc84c0ef98b602
SHA1c7fca5c3aad34f7237b6990329cf80da48276760
SHA256b8454cdb84337a614e4f509064574ab44af9c6349a5e4b086aa6111e005a1e4b
SHA51219b424f625f559598e79a9beab2fe602fd952a8552edc983a6e550c46b5adbb2a81eefa0408b9d4f44f54c434ea91244de1ef7ad17912a7e7c9be803e213a15e