Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-03-2024 17:37
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-06_4ef0ea39575ee4364bd7a09a7f8e4e10_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-06_4ef0ea39575ee4364bd7a09a7f8e4e10_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-06_4ef0ea39575ee4364bd7a09a7f8e4e10_icedid.exe
-
Size
318KB
-
MD5
4ef0ea39575ee4364bd7a09a7f8e4e10
-
SHA1
3fb0cfb0e81781e6698ccef2ceeb6390930f8847
-
SHA256
1779d38f9a3432464e143356e909095d6ab9d6ba031e4b78953857b9828ef995
-
SHA512
2d01c7bb04fbf22906565612803342192006ce6688a36818b72f57ca137b0fc1c8bca70bbecfd3c4ab59fec072e3a56c9580c4c61d44ea69f252cbe30d08e687
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2364 approach.exe -
Loads dropped DLL 2 IoCs
pid Process 1908 2024-03-06_4ef0ea39575ee4364bd7a09a7f8e4e10_icedid.exe 1908 2024-03-06_4ef0ea39575ee4364bd7a09a7f8e4e10_icedid.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\silently\approach.exe 2024-03-06_4ef0ea39575ee4364bd7a09a7f8e4e10_icedid.exe File opened for modification C:\Program Files\silently\approach.exe 2024-03-06_4ef0ea39575ee4364bd7a09a7f8e4e10_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1908 2024-03-06_4ef0ea39575ee4364bd7a09a7f8e4e10_icedid.exe 1908 2024-03-06_4ef0ea39575ee4364bd7a09a7f8e4e10_icedid.exe 1908 2024-03-06_4ef0ea39575ee4364bd7a09a7f8e4e10_icedid.exe 1908 2024-03-06_4ef0ea39575ee4364bd7a09a7f8e4e10_icedid.exe 2364 approach.exe 2364 approach.exe 2364 approach.exe 2364 approach.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1908 wrote to memory of 2364 1908 2024-03-06_4ef0ea39575ee4364bd7a09a7f8e4e10_icedid.exe 28 PID 1908 wrote to memory of 2364 1908 2024-03-06_4ef0ea39575ee4364bd7a09a7f8e4e10_icedid.exe 28 PID 1908 wrote to memory of 2364 1908 2024-03-06_4ef0ea39575ee4364bd7a09a7f8e4e10_icedid.exe 28 PID 1908 wrote to memory of 2364 1908 2024-03-06_4ef0ea39575ee4364bd7a09a7f8e4e10_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-06_4ef0ea39575ee4364bd7a09a7f8e4e10_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-06_4ef0ea39575ee4364bd7a09a7f8e4e10_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Program Files\silently\approach.exe"C:\Program Files\silently\approach.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2364
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
318KB
MD55df8b3de450a5513c612a76525552883
SHA13e6b83e43bab28e9a6f669ce844e774f4483e4ef
SHA2569c835111a09cb5104a6c2832c6d8ad97a366beb4201f13cac8adcec674a031b0
SHA512360db2706472c152152b3730fb54fd7804af754285c8c8f85e5b238117d31bd40826331aff5a19973f5e0b2921fc80d55f492000c904418a0204a6ae1cdcb81d