Analysis
-
max time kernel
90s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
19/02/2024, 19:52
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-19_7a0096ab73016655c2327b3a49f9fc85_icedid.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-02-19_7a0096ab73016655c2327b3a49f9fc85_icedid.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-19_7a0096ab73016655c2327b3a49f9fc85_icedid.exe
-
Size
276KB
-
MD5
7a0096ab73016655c2327b3a49f9fc85
-
SHA1
9f9a0df458cce32c617eca3c361a8226c02f75e0
-
SHA256
7d1c642b60414883dc53c15abfdb2b8e1bc926d8f065529243a879cc7999fbaa
-
SHA512
6be4b6598bd8fc14a6216499ee1e36167fe5c833bfe2c5e7ddee17ef83758089f9d057fc87c643569a4a7980268764c8fd721ded4c823eb866f01d661bd979be
-
SSDEEP
3072:lxUm75Fku3eKeO213SJReOqdmErj+HyHnNVIPL/+ybbiW1u46Q7qV3lU8xM:fU8Dk11CJ1qDWUNVIT/bblS9x
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1732 Graphics.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\component\Graphics.exe 2024-02-19_7a0096ab73016655c2327b3a49f9fc85_icedid.exe File opened for modification C:\Program Files\component\Graphics.exe 2024-02-19_7a0096ab73016655c2327b3a49f9fc85_icedid.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3160 3832 WerFault.exe 84 4836 3832 WerFault.exe 84 -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3832 2024-02-19_7a0096ab73016655c2327b3a49f9fc85_icedid.exe 3832 2024-02-19_7a0096ab73016655c2327b3a49f9fc85_icedid.exe 3832 2024-02-19_7a0096ab73016655c2327b3a49f9fc85_icedid.exe 3832 2024-02-19_7a0096ab73016655c2327b3a49f9fc85_icedid.exe 1732 Graphics.exe 1732 Graphics.exe 1732 Graphics.exe 1732 Graphics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3832 wrote to memory of 1732 3832 2024-02-19_7a0096ab73016655c2327b3a49f9fc85_icedid.exe 85 PID 3832 wrote to memory of 1732 3832 2024-02-19_7a0096ab73016655c2327b3a49f9fc85_icedid.exe 85 PID 3832 wrote to memory of 1732 3832 2024-02-19_7a0096ab73016655c2327b3a49f9fc85_icedid.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-19_7a0096ab73016655c2327b3a49f9fc85_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-19_7a0096ab73016655c2327b3a49f9fc85_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Program Files\component\Graphics.exe"C:\Program Files\component\Graphics.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3832 -s 10282⤵
- Program crash
PID:3160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3832 -s 10442⤵
- Program crash
PID:4836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3832 -ip 38321⤵PID:1912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3832 -ip 38321⤵PID:1076
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
277KB
MD59734584438d4a6280291dde66f90daff
SHA1977d95a4757ae04a3fe8e0429153715dbefc4c61
SHA25666a0a92308a664f19e14b91bcb83c15e6698a069a8ddd4c65f24cc022b0fd085
SHA51267391b99bad5fa97abac48164931c3d9ef4133c51cf40ca2678fff9265bec1749a54413cee0750402e4a847f02a5ab6b1a4bf4682bbe160ebf81b11f9d8ce096