Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/02/2024, 12:34
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-23_4c58c9beb20602dd9b6314779eb2998d_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-23_4c58c9beb20602dd9b6314779eb2998d_icedid.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-23_4c58c9beb20602dd9b6314779eb2998d_icedid.exe
-
Size
316KB
-
MD5
4c58c9beb20602dd9b6314779eb2998d
-
SHA1
74005aaff3e307eb8f94387f4992976346e03984
-
SHA256
020fc74b5395aa37aca05fb5c3a7ad362cfb34bedd6a02bcf658f47b8bfda36d
-
SHA512
136b7217d8ef711e54c0d3efc6d700a330c5842846b3848d9055b8ed18020fb31c9f9b2d44e73d387a04e4cfaf96f82d8c9268f2451e6dee43f70d0f3906e96e
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2592 Diagnostic.exe -
Loads dropped DLL 2 IoCs
pid Process 2492 2024-02-23_4c58c9beb20602dd9b6314779eb2998d_icedid.exe 2492 2024-02-23_4c58c9beb20602dd9b6314779eb2998d_icedid.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\findout\Diagnostic.exe 2024-02-23_4c58c9beb20602dd9b6314779eb2998d_icedid.exe File created C:\Program Files\findout\Diagnostic.exe 2024-02-23_4c58c9beb20602dd9b6314779eb2998d_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2492 2024-02-23_4c58c9beb20602dd9b6314779eb2998d_icedid.exe 2492 2024-02-23_4c58c9beb20602dd9b6314779eb2998d_icedid.exe 2492 2024-02-23_4c58c9beb20602dd9b6314779eb2998d_icedid.exe 2492 2024-02-23_4c58c9beb20602dd9b6314779eb2998d_icedid.exe 2592 Diagnostic.exe 2592 Diagnostic.exe 2592 Diagnostic.exe 2592 Diagnostic.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2492 wrote to memory of 2592 2492 2024-02-23_4c58c9beb20602dd9b6314779eb2998d_icedid.exe 28 PID 2492 wrote to memory of 2592 2492 2024-02-23_4c58c9beb20602dd9b6314779eb2998d_icedid.exe 28 PID 2492 wrote to memory of 2592 2492 2024-02-23_4c58c9beb20602dd9b6314779eb2998d_icedid.exe 28 PID 2492 wrote to memory of 2592 2492 2024-02-23_4c58c9beb20602dd9b6314779eb2998d_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-23_4c58c9beb20602dd9b6314779eb2998d_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-23_4c58c9beb20602dd9b6314779eb2998d_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Program Files\findout\Diagnostic.exe"C:\Program Files\findout\Diagnostic.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2592
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
316KB
MD54ee0ed26c66a3fcc244c2216a08aa652
SHA15962b4630bc7d532ef036a64aa575bae9753cc78
SHA256f8f7c16d19e02a690c35497a7a43ea55182fe66fae555054a818b860c211493f
SHA512fc97632ac769c00c0a20ff2000c7821491d70eae7028501fe065acf3e371fe5a8b35a2c7789565713132566a1a4553e7f405dcd87f94a0e2103e01c14364e78d