Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/03/2024, 23:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-05_366f50097dcd72a177330be7330d728e_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-05_366f50097dcd72a177330be7330d728e_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-05_366f50097dcd72a177330be7330d728e_icedid.exe
-
Size
267KB
-
MD5
366f50097dcd72a177330be7330d728e
-
SHA1
688341bcdce1012052bf31c1eeb46c569a35ec4f
-
SHA256
3a749f7dfd89884e6e2466aeab3af849bbf7d178cd8e26b285672cf6762382f1
-
SHA512
bcb1aac3763bac8b49e4f805d19b7f7986642633333792711f1673ec577bfb725d8f5d7e2328bd4ff77e81ba8a9dd0ba821869a610b6c489e91e3763ce7d6ae0
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1320 application.exe -
Loads dropped DLL 2 IoCs
pid Process 1228 2024-03-05_366f50097dcd72a177330be7330d728e_icedid.exe 1228 2024-03-05_366f50097dcd72a177330be7330d728e_icedid.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\GetVersion\application.exe 2024-03-05_366f50097dcd72a177330be7330d728e_icedid.exe File created C:\Program Files\GetVersion\application.exe 2024-03-05_366f50097dcd72a177330be7330d728e_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1228 2024-03-05_366f50097dcd72a177330be7330d728e_icedid.exe 1228 2024-03-05_366f50097dcd72a177330be7330d728e_icedid.exe 1228 2024-03-05_366f50097dcd72a177330be7330d728e_icedid.exe 1228 2024-03-05_366f50097dcd72a177330be7330d728e_icedid.exe 1320 application.exe 1320 application.exe 1320 application.exe 1320 application.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1228 wrote to memory of 1320 1228 2024-03-05_366f50097dcd72a177330be7330d728e_icedid.exe 28 PID 1228 wrote to memory of 1320 1228 2024-03-05_366f50097dcd72a177330be7330d728e_icedid.exe 28 PID 1228 wrote to memory of 1320 1228 2024-03-05_366f50097dcd72a177330be7330d728e_icedid.exe 28 PID 1228 wrote to memory of 1320 1228 2024-03-05_366f50097dcd72a177330be7330d728e_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_366f50097dcd72a177330be7330d728e_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-05_366f50097dcd72a177330be7330d728e_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Program Files\GetVersion\application.exe"C:\Program Files\GetVersion\application.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1320
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
142KB
MD57b81588afe21a9dfed125f32f3ed5383
SHA1f7277fcf9c9f8dcb4838ebdf2026035c49ef0b8d
SHA256f7538beb1a01b12047c1dfec12fdb4a361d171c99d1b655a6a9674c4f5b97259
SHA5124824e02d7e908d14e456b53a3c71dcaca3ed53131e874d7e9086df58439dba08cad062ff3fc03687bca349aaf98a1bc93d78e0489f004509d97e7f69cdaebd62
-
Filesize
64KB
MD5797006726cc17c5cfade85d080952619
SHA1109168a242609be4eeedb2ec1c64ccb5da4d456e
SHA256ae26f0c0750ee77821328287b76d83d9dfc017624cad74e01e7468228c397495
SHA512b967586c1a95c3ab1b6ce45ba849a926c45ece2c0b49ed2c23397091d38168a1580372f0b6496e2da1058ea1302255ad6326c69aef86fd790166b828a63cf3f0
-
Filesize
267KB
MD56e63de233a79f343ff1b39fff7489043
SHA118136b40ad0e3a91501217b0e48b1488443660ea
SHA25603d813829cb2877cda2dd2350d8e0cfcea664e1b52af2480c9395932faaad045
SHA51258b59ec385084e0f12b1916010dab3cc0eeb7b0db30c5642baa733b080013ab0f1d342b46c8c332bee73b4598f0408f69692e55414ac6bf1a763e6bf423d2c32
-
Filesize
192KB
MD5c23ca0d00658bd5c548661f2682084ab
SHA1d25c18ca24fa7e31a5163a530f15ebc691afd4a7
SHA256a7909ae1606f68d738f4c77295d0885f390f9da203049fb2a6d409b37aa1a507
SHA5122637f745bc04715b6620d8e183f5035f5e9da55160205659c843daec2a0b845dbfaf9c265de970f1227f654005d3d59440c17ae9a0e4fce41cfd88124f199980