Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
21/02/2024, 18:01
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-21_c1085ce2fa2fb93864d10d1e64cee583_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-21_c1085ce2fa2fb93864d10d1e64cee583_icedid.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-21_c1085ce2fa2fb93864d10d1e64cee583_icedid.exe
-
Size
315KB
-
MD5
c1085ce2fa2fb93864d10d1e64cee583
-
SHA1
da901a9bbf76ccb7b13029dab05b8d997c770775
-
SHA256
7112782fe7f53b1ccf3ed9fadefe36a663c47d56a05cf14d3e397814c2b1ceab
-
SHA512
75105d50ff7e90c52a821c996b7e359fc3c62601d0a5c0fe1ac6bd30f32e564a0d25c8e3ccfa0a394977417d0168884040a9658407df30d32fe915ff087110d7
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4864 build.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\headers\build.exe 2024-02-21_c1085ce2fa2fb93864d10d1e64cee583_icedid.exe File opened for modification C:\Program Files\headers\build.exe 2024-02-21_c1085ce2fa2fb93864d10d1e64cee583_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 396 2024-02-21_c1085ce2fa2fb93864d10d1e64cee583_icedid.exe 396 2024-02-21_c1085ce2fa2fb93864d10d1e64cee583_icedid.exe 396 2024-02-21_c1085ce2fa2fb93864d10d1e64cee583_icedid.exe 396 2024-02-21_c1085ce2fa2fb93864d10d1e64cee583_icedid.exe 4864 build.exe 4864 build.exe 4864 build.exe 4864 build.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 396 wrote to memory of 4864 396 2024-02-21_c1085ce2fa2fb93864d10d1e64cee583_icedid.exe 82 PID 396 wrote to memory of 4864 396 2024-02-21_c1085ce2fa2fb93864d10d1e64cee583_icedid.exe 82 PID 396 wrote to memory of 4864 396 2024-02-21_c1085ce2fa2fb93864d10d1e64cee583_icedid.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-21_c1085ce2fa2fb93864d10d1e64cee583_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-21_c1085ce2fa2fb93864d10d1e64cee583_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Program Files\headers\build.exe"C:\Program Files\headers\build.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4864
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
315KB
MD5e2e1f272f9ab5f03c394fe860197c13b
SHA18661b160e72d27f670333c039d4cae0cca8e3da4
SHA25622e75f4b9065689fd57892732feef96188299ab4006221765da550717354e050
SHA512251240bfbc23f233a7df5543a66aafac6d460a1d4ecd21bbcb680fa442b7371060a2f0884377c5c64387cde929606cd59cccd61a94ef31eb94567f2a22c69560