Analysis
-
max time kernel
93s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25-02-2024 15:53
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-25_d615d314c233a2eaba100d8dcf2114b5_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-25_d615d314c233a2eaba100d8dcf2114b5_icedid.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-25_d615d314c233a2eaba100d8dcf2114b5_icedid.exe
-
Size
391KB
-
MD5
d615d314c233a2eaba100d8dcf2114b5
-
SHA1
6156fabe9339bafa89ac74ed76dfaf6b3b28d7ce
-
SHA256
7abb664ba30534e0b40709d882a285e57c1083088e3f4e54a441a1511ddb8e68
-
SHA512
3f36dead12be77d764fdb9229444b89b6eacaf6273b3cd9afca31c635ba32e8dd0bc7cbebc28eafdc217a113f9b81dcff5732f85fbeb104dd86b48f8a45ba1fb
-
SSDEEP
12288:LplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:9xRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4936 Windows.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\existing\Windows.exe 2024-02-25_d615d314c233a2eaba100d8dcf2114b5_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3228 2024-02-25_d615d314c233a2eaba100d8dcf2114b5_icedid.exe 3228 2024-02-25_d615d314c233a2eaba100d8dcf2114b5_icedid.exe 3228 2024-02-25_d615d314c233a2eaba100d8dcf2114b5_icedid.exe 3228 2024-02-25_d615d314c233a2eaba100d8dcf2114b5_icedid.exe 4936 Windows.exe 4936 Windows.exe 4936 Windows.exe 4936 Windows.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3228 wrote to memory of 4936 3228 2024-02-25_d615d314c233a2eaba100d8dcf2114b5_icedid.exe 86 PID 3228 wrote to memory of 4936 3228 2024-02-25_d615d314c233a2eaba100d8dcf2114b5_icedid.exe 86 PID 3228 wrote to memory of 4936 3228 2024-02-25_d615d314c233a2eaba100d8dcf2114b5_icedid.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-25_d615d314c233a2eaba100d8dcf2114b5_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-25_d615d314c233a2eaba100d8dcf2114b5_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Program Files\existing\Windows.exe"C:\Program Files\existing\Windows.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4936
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
391KB
MD54d98d9ce205f1283b228b9af97334753
SHA1772ea3ba21f7ad79ae6f3a6b2addb091643aac4d
SHA25678f2d20fa60c7d5010ed4a72cdaacc48c5ea335f21a6ba14d869da0db5064ccf
SHA512af3a4209f753baca4f7ed5a4234536f30bcf133d085021bdf942bebb23f30578728746b52a93b9cc1fde6ff1803f2ca7c20db5d63a5e274e1052271fb6179f90