Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-02-2024 13:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-28_933be87ac871340e40202407cdbf6842_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-28_933be87ac871340e40202407cdbf6842_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-02-28_933be87ac871340e40202407cdbf6842_icedid.exe
-
Size
314KB
-
MD5
933be87ac871340e40202407cdbf6842
-
SHA1
e37d9f896eac6b53a50ee2ed95f2c3bd62c22305
-
SHA256
d1bdb219fcf80b885e9c12222732e434c0d9e8be79aaa61fe4e1608ac9ce5872
-
SHA512
5a570651bc37c0850b230a6ac566f91157f6ea1ce417142bfe67b9e571cb239fde1eef6657dea37b2816cb4eeb2f32f6aca2529036abceaddfbb3c5a924a3599
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1256 Polish.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Korean\Polish.exe 2024-02-28_933be87ac871340e40202407cdbf6842_icedid.exe File opened for modification C:\Program Files\Korean\Polish.exe 2024-02-28_933be87ac871340e40202407cdbf6842_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4748 2024-02-28_933be87ac871340e40202407cdbf6842_icedid.exe 4748 2024-02-28_933be87ac871340e40202407cdbf6842_icedid.exe 4748 2024-02-28_933be87ac871340e40202407cdbf6842_icedid.exe 4748 2024-02-28_933be87ac871340e40202407cdbf6842_icedid.exe 1256 Polish.exe 1256 Polish.exe 1256 Polish.exe 1256 Polish.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4748 wrote to memory of 1256 4748 2024-02-28_933be87ac871340e40202407cdbf6842_icedid.exe 90 PID 4748 wrote to memory of 1256 4748 2024-02-28_933be87ac871340e40202407cdbf6842_icedid.exe 90 PID 4748 wrote to memory of 1256 4748 2024-02-28_933be87ac871340e40202407cdbf6842_icedid.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-28_933be87ac871340e40202407cdbf6842_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-28_933be87ac871340e40202407cdbf6842_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Program Files\Korean\Polish.exe"C:\Program Files\Korean\Polish.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1256
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
314KB
MD57f7f4abc7c99d8a9603a23e5d6b20980
SHA1899061833b5bc5473354d32b7cd197c8d33462dd
SHA2569162590a4a7611384a8224041d8a6475fab1e6ae5bc54bcb9842253d34554127
SHA51246f3d4edb346420c2e38c0b39cae13b630d2987a18c0c99a848737ca5e442c2311092040437cf493d167c749a659ec7d9dc6e6fa0e7e6a1eed8e23a0beda1178