Analysis
-
max time kernel
144s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 08:39
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-05_9eef1e231b4498e0766edea8e0a0fbcf_icedid.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-03-05_9eef1e231b4498e0766edea8e0a0fbcf_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-05_9eef1e231b4498e0766edea8e0a0fbcf_icedid.exe
-
Size
382KB
-
MD5
9eef1e231b4498e0766edea8e0a0fbcf
-
SHA1
3d4da51b82b528521ae3a86a8d451197f4d9c747
-
SHA256
52ddae73192b8151f2588e667ca55f6770c932d5ace74a3551ac35e88e3c4757
-
SHA512
435587f20cc71800ac10ad68e99c8dad8fecd683711e3e3b03d613646a09d82c54f278f48ed550e9389e68ed10ae4cf0a90b97c70cd3fa883e488b8772279a18
-
SSDEEP
6144:OplrlbbDdQaqd2X/96fr3KFEUGjr8uB2WgcA0cpXEVNrvGZ4FUqm6:OplrVbDdQaqdS/ofraFErH8uB2Wm0SXj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1048 Wesley.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Addison\Wesley.exe 2024-03-05_9eef1e231b4498e0766edea8e0a0fbcf_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3604 2024-03-05_9eef1e231b4498e0766edea8e0a0fbcf_icedid.exe 3604 2024-03-05_9eef1e231b4498e0766edea8e0a0fbcf_icedid.exe 3604 2024-03-05_9eef1e231b4498e0766edea8e0a0fbcf_icedid.exe 3604 2024-03-05_9eef1e231b4498e0766edea8e0a0fbcf_icedid.exe 1048 Wesley.exe 1048 Wesley.exe 1048 Wesley.exe 1048 Wesley.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3604 wrote to memory of 1048 3604 2024-03-05_9eef1e231b4498e0766edea8e0a0fbcf_icedid.exe 91 PID 3604 wrote to memory of 1048 3604 2024-03-05_9eef1e231b4498e0766edea8e0a0fbcf_icedid.exe 91 PID 3604 wrote to memory of 1048 3604 2024-03-05_9eef1e231b4498e0766edea8e0a0fbcf_icedid.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_9eef1e231b4498e0766edea8e0a0fbcf_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-05_9eef1e231b4498e0766edea8e0a0fbcf_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Program Files\Addison\Wesley.exe"C:\Program Files\Addison\Wesley.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1048
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
382KB
MD5e227e6309b4ff332e8f193157dfa9c69
SHA1c9ac2b0af121b811baf41123623c0677c8b3c617
SHA256b29a6711a9a8fb54f450bf600ddcf5f6e7b3eaa75c8c058e482070b21d33660f
SHA5120119160c8668db41e9857c78fc620d5620c00369ec82d4a536aef321d2345d627370f7374b4fdc7c949d641cf1da6f027c2d0163649d08af54e25f4b2494aecc