Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/02/2024, 15:34
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-22_54c300a3d2c46cb94c81af75209ca47d_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-22_54c300a3d2c46cb94c81af75209ca47d_icedid.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-22_54c300a3d2c46cb94c81af75209ca47d_icedid.exe
-
Size
381KB
-
MD5
54c300a3d2c46cb94c81af75209ca47d
-
SHA1
3895518815041beecb0272c60f5e9fff5c70fc87
-
SHA256
34bfa60e499f645fb2b2372927767d76e9f3ab95847ebf3b94cf488cce8d0dd4
-
SHA512
cafe65c6af607f5376d6d267997f028cd63445db31461a622da043f0d53fef04b5563eeeba5a316d6d6e1eb98e9b7e92807cce5e5657c13d7e838ed5714c57dc
-
SSDEEP
6144:pplrlbbDdQaqd2X/96fr3KFEUGjr8uB2WgcA0cpXEVNrvGZ4FUqm6:pplrVbDdQaqdS/ofraFErH8uB2Wm0SXj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2936 library.exe -
Loads dropped DLL 2 IoCs
pid Process 2872 2024-02-22_54c300a3d2c46cb94c81af75209ca47d_icedid.exe 2872 2024-02-22_54c300a3d2c46cb94c81af75209ca47d_icedid.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\match\library.exe 2024-02-22_54c300a3d2c46cb94c81af75209ca47d_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2872 2024-02-22_54c300a3d2c46cb94c81af75209ca47d_icedid.exe 2872 2024-02-22_54c300a3d2c46cb94c81af75209ca47d_icedid.exe 2872 2024-02-22_54c300a3d2c46cb94c81af75209ca47d_icedid.exe 2872 2024-02-22_54c300a3d2c46cb94c81af75209ca47d_icedid.exe 2936 library.exe 2936 library.exe 2936 library.exe 2936 library.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2936 2872 2024-02-22_54c300a3d2c46cb94c81af75209ca47d_icedid.exe 28 PID 2872 wrote to memory of 2936 2872 2024-02-22_54c300a3d2c46cb94c81af75209ca47d_icedid.exe 28 PID 2872 wrote to memory of 2936 2872 2024-02-22_54c300a3d2c46cb94c81af75209ca47d_icedid.exe 28 PID 2872 wrote to memory of 2936 2872 2024-02-22_54c300a3d2c46cb94c81af75209ca47d_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-22_54c300a3d2c46cb94c81af75209ca47d_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-22_54c300a3d2c46cb94c81af75209ca47d_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files\match\library.exe"C:\Program Files\match\library.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2936
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
381KB
MD5671c0ad04f694a0e699e5c6ce7b8457a
SHA106e7f370e51c66261161207a35f42b4c7bff56d2
SHA256d8350c089dcb7d4cb37f1087f3d8fef3b671f4f677de2d6ae8c36f6857d8a153
SHA512a7d4e29690c7c6925fc6243e9e4a4b9d115f84cf8963905dc1723c295f2ca4cd9623a6379b0d01e8d7e67fa5384809f38adbc4ebce6c0245696683735eebfa5d