Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
28/02/2024, 01:33
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-28_4e22718fdd8808a7a29b8817ae71b935_icedid.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-02-28_4e22718fdd8808a7a29b8817ae71b935_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-02-28_4e22718fdd8808a7a29b8817ae71b935_icedid.exe
-
Size
266KB
-
MD5
4e22718fdd8808a7a29b8817ae71b935
-
SHA1
59ace49a4b426c0cc860a81b0639acddc4dbc609
-
SHA256
8897d26d091942c30c62a10a2f24a4cd10cbd9f7f37fed7054d43531c316198a
-
SHA512
1e75d8c73900140dd69cd476bf656ea7f4cca57cf0fded3ffd2ec541f5b609ecf57c9816077e218771d67a37a8e243bbfe934399b27bd84f54248b6d4e31c8bc
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1852 Windows.exe -
Loads dropped DLL 2 IoCs
pid Process 1844 2024-02-28_4e22718fdd8808a7a29b8817ae71b935_icedid.exe 1844 2024-02-28_4e22718fdd8808a7a29b8817ae71b935_icedid.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\existing\Windows.exe 2024-02-28_4e22718fdd8808a7a29b8817ae71b935_icedid.exe File opened for modification C:\Program Files\existing\Windows.exe 2024-02-28_4e22718fdd8808a7a29b8817ae71b935_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1844 2024-02-28_4e22718fdd8808a7a29b8817ae71b935_icedid.exe 1844 2024-02-28_4e22718fdd8808a7a29b8817ae71b935_icedid.exe 1844 2024-02-28_4e22718fdd8808a7a29b8817ae71b935_icedid.exe 1844 2024-02-28_4e22718fdd8808a7a29b8817ae71b935_icedid.exe 1852 Windows.exe 1852 Windows.exe 1852 Windows.exe 1852 Windows.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1844 wrote to memory of 1852 1844 2024-02-28_4e22718fdd8808a7a29b8817ae71b935_icedid.exe 28 PID 1844 wrote to memory of 1852 1844 2024-02-28_4e22718fdd8808a7a29b8817ae71b935_icedid.exe 28 PID 1844 wrote to memory of 1852 1844 2024-02-28_4e22718fdd8808a7a29b8817ae71b935_icedid.exe 28 PID 1844 wrote to memory of 1852 1844 2024-02-28_4e22718fdd8808a7a29b8817ae71b935_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-28_4e22718fdd8808a7a29b8817ae71b935_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-28_4e22718fdd8808a7a29b8817ae71b935_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Program Files\existing\Windows.exe"C:\Program Files\existing\Windows.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1852
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266KB
MD58b9fc731a029c3aedf79d11b7324b21c
SHA135a1e5082a5fd174ac2b229b78757d8d76ede05f
SHA2567a377a849b5f41a034d0c2f2a342f4c799b41000b3ebdd2f1dbe8816867139bd
SHA5128c81199b7f9936b22188b07bacdbb0256f8a81e3fc7e6a90f3c2ddf1f24967748ffa42249349eb9244fbaee7f9dd30b94e72f5f58738a898f59971335aaec96e