Analysis
-
max time kernel
139s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 18:37
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-06_9959ad7993a80d5e5137404be7140e6f_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-06_9959ad7993a80d5e5137404be7140e6f_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-06_9959ad7993a80d5e5137404be7140e6f_icedid.exe
-
Size
266KB
-
MD5
9959ad7993a80d5e5137404be7140e6f
-
SHA1
17c7ee60766af4fef1d0b62fec62aa63129a14b3
-
SHA256
8d7db00bb37d1b13fbc9fc9af742b287f6e71a039d808e6721755c13c6151aa5
-
SHA512
19778683e899ebd9044d05cc9c1039e5c185024eb92bf9c04c44822bcb7c3d5593c40a2932fbfdb13d9834d105f59c116c96f3e06a6051015013535caaf1c4a9
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2352 accordingly.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\alternatives\accordingly.exe 2024-03-06_9959ad7993a80d5e5137404be7140e6f_icedid.exe File opened for modification C:\Program Files\alternatives\accordingly.exe 2024-03-06_9959ad7993a80d5e5137404be7140e6f_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1996 2024-03-06_9959ad7993a80d5e5137404be7140e6f_icedid.exe 1996 2024-03-06_9959ad7993a80d5e5137404be7140e6f_icedid.exe 1996 2024-03-06_9959ad7993a80d5e5137404be7140e6f_icedid.exe 1996 2024-03-06_9959ad7993a80d5e5137404be7140e6f_icedid.exe 2352 accordingly.exe 2352 accordingly.exe 2352 accordingly.exe 2352 accordingly.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1996 wrote to memory of 2352 1996 2024-03-06_9959ad7993a80d5e5137404be7140e6f_icedid.exe 91 PID 1996 wrote to memory of 2352 1996 2024-03-06_9959ad7993a80d5e5137404be7140e6f_icedid.exe 91 PID 1996 wrote to memory of 2352 1996 2024-03-06_9959ad7993a80d5e5137404be7140e6f_icedid.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-06_9959ad7993a80d5e5137404be7140e6f_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-06_9959ad7993a80d5e5137404be7140e6f_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Program Files\alternatives\accordingly.exe"C:\Program Files\alternatives\accordingly.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2352
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266KB
MD5f2f9742f6ea92e1299b7937d35a2ca60
SHA1b1317b67f98ec0ae1d1fc3dd9c084f0fe0afc5ce
SHA25688ee0499e4427ebf72f9b9d57485016a1626fc40476a399b689332f1213b3c64
SHA5122fe51d543e1dfbcdcef5306de786fb5713b23ef9a9ae88e21ede6a3ec80e6235d42334c702da6fca3f0403eba5ffb7578b785a5c79ec43bbe85e3233b19e14ab