Analysis
-
max time kernel
123s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/02/2024, 11:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-24_625800d92cca1bb60035f90e97f8a1bf_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-24_625800d92cca1bb60035f90e97f8a1bf_icedid.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-24_625800d92cca1bb60035f90e97f8a1bf_icedid.exe
-
Size
2.4MB
-
MD5
625800d92cca1bb60035f90e97f8a1bf
-
SHA1
66517fc3e08ddfb0ed1db986756fccaa959bbf16
-
SHA256
ac6134814abf7f4b0e46eafea3889675373dcec3d41583877ed1fcc095011176
-
SHA512
859f9a25fd8b9825e4e304e0c23a113b932847dd1d3d61e9f958deeb6908deec31c9a1ad4cb98b13959aa8bf711a5d8d21245cd3d509504549c95dbd7161d196
-
SSDEEP
49152:PH2BHlLfYcpvmE0SukeNfiAD03yy/cP7BjwV/YnDnHW/I8E6vp1aLmGCaw:PAFLYcv0vfD03yy/cPlFnHW/I8EKaLm
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2024-02-24_625800d92cca1bb60035f90e97f8a1bf_icedid.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 2024-02-24_625800d92cca1bb60035f90e97f8a1bf_icedid.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2992 2024-02-24_625800d92cca1bb60035f90e97f8a1bf_icedid.exe