Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24-02-2024 09:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-24_848ebabca4b687d497bf03f8edd908b8_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-24_848ebabca4b687d497bf03f8edd908b8_icedid.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-24_848ebabca4b687d497bf03f8edd908b8_icedid.exe
-
Size
422KB
-
MD5
848ebabca4b687d497bf03f8edd908b8
-
SHA1
4c91956ca2fb4253da2519a9327c9e257734ae75
-
SHA256
eadbdab45976fa79b0c3608d10c1fcf6940f3365f0a47c8f4f4497727d72f49a
-
SHA512
5099fdec1449eb7ae18f239efb0f895a3c335b6fb52e69cffcb4e2459f1a8e46b7d098416dab68ad73de0c63d6c5901f13f09d7d651ff03274448c4521cf66c3
-
SSDEEP
12288:tplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:PxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1328 code.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\managed\code.exe 2024-02-24_848ebabca4b687d497bf03f8edd908b8_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4760 2024-02-24_848ebabca4b687d497bf03f8edd908b8_icedid.exe 4760 2024-02-24_848ebabca4b687d497bf03f8edd908b8_icedid.exe 4760 2024-02-24_848ebabca4b687d497bf03f8edd908b8_icedid.exe 4760 2024-02-24_848ebabca4b687d497bf03f8edd908b8_icedid.exe 1328 code.exe 1328 code.exe 1328 code.exe 1328 code.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4760 wrote to memory of 1328 4760 2024-02-24_848ebabca4b687d497bf03f8edd908b8_icedid.exe 87 PID 4760 wrote to memory of 1328 4760 2024-02-24_848ebabca4b687d497bf03f8edd908b8_icedid.exe 87 PID 4760 wrote to memory of 1328 4760 2024-02-24_848ebabca4b687d497bf03f8edd908b8_icedid.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-24_848ebabca4b687d497bf03f8edd908b8_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-24_848ebabca4b687d497bf03f8edd908b8_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Program Files\managed\code.exe"C:\Program Files\managed\code.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1328
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
422KB
MD50c6f95c1bd370989318bd4de440ae576
SHA17f2327b19256c6b379bb71e1b4b67bab664e1394
SHA256b5a69aa70ba2b5b61819b77b602119989999c8512b77150edcffa5ef8a10ceb4
SHA512e5cb6f7ca1e81e56e78aeec3b56a4ef3a95d72ce608fd1564231521160ce8c0fae9d9989cfdd899e34f5fbe56a30223415add68f52e30a639056773a09d823e1