Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-03-2024 19:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-05_b6aa458d756f1a37d346068e736a6042_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-05_b6aa458d756f1a37d346068e736a6042_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-05_b6aa458d756f1a37d346068e736a6042_icedid.exe
-
Size
417KB
-
MD5
b6aa458d756f1a37d346068e736a6042
-
SHA1
7545ed299b467013b5c48a810216cf58ee705894
-
SHA256
1834dfb30145a8fbeb6f0ba5cdeec192f5308214b3f63f15fd684ecb3e6ee90b
-
SHA512
959cf896b2fa2cb4ef9b83c436900a84f4dd5a8d97b2435507b88337340a7bd2bacba6f3f06003533ee118e8c3b3630c8f4a7b33d03fc19104142d71a0290085
-
SSDEEP
12288:rplrVbDdQaqdS/ofraFErH8uB2Wm0SX/Nr5FU:dxRQ+Fucuvm0a/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2300 DirectSetup.exe -
Loads dropped DLL 4 IoCs
pid Process 1612 2024-03-05_b6aa458d756f1a37d346068e736a6042_icedid.exe 2300 DirectSetup.exe 2300 DirectSetup.exe 2300 DirectSetup.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\with\DirectSetup.exe 2024-03-05_b6aa458d756f1a37d346068e736a6042_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1612 2024-03-05_b6aa458d756f1a37d346068e736a6042_icedid.exe 1612 2024-03-05_b6aa458d756f1a37d346068e736a6042_icedid.exe 1612 2024-03-05_b6aa458d756f1a37d346068e736a6042_icedid.exe 1612 2024-03-05_b6aa458d756f1a37d346068e736a6042_icedid.exe 2300 DirectSetup.exe 2300 DirectSetup.exe 2300 DirectSetup.exe 2300 DirectSetup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1612 wrote to memory of 2300 1612 2024-03-05_b6aa458d756f1a37d346068e736a6042_icedid.exe 28 PID 1612 wrote to memory of 2300 1612 2024-03-05_b6aa458d756f1a37d346068e736a6042_icedid.exe 28 PID 1612 wrote to memory of 2300 1612 2024-03-05_b6aa458d756f1a37d346068e736a6042_icedid.exe 28 PID 1612 wrote to memory of 2300 1612 2024-03-05_b6aa458d756f1a37d346068e736a6042_icedid.exe 28 PID 1612 wrote to memory of 2300 1612 2024-03-05_b6aa458d756f1a37d346068e736a6042_icedid.exe 28 PID 1612 wrote to memory of 2300 1612 2024-03-05_b6aa458d756f1a37d346068e736a6042_icedid.exe 28 PID 1612 wrote to memory of 2300 1612 2024-03-05_b6aa458d756f1a37d346068e736a6042_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_b6aa458d756f1a37d346068e736a6042_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-05_b6aa458d756f1a37d346068e736a6042_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Program Files\with\DirectSetup.exe"C:\Program Files\with\DirectSetup.exe" "33201"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2300
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
417KB
MD54d1219c11015945fccb79401c495cbb6
SHA1c0a92fc550833be61142ece9659944db4fd619cf
SHA2564ca29fdbabe12654a94d0f3a4656aaf57f60baa5042b11c1de012a46de2bf61a
SHA5126955938ce4844f444e9e38db15de556a90fd3085f08a2b34cdaec8c2f093f0f0b089194f5ff809b8b3428198fe873ce2a1b001ce068fe02cfea5cd061a9e83c5