Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 05:41
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-09_7c4d1abece5cc45158b8870875a133ca_icedid.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-03-09_7c4d1abece5cc45158b8870875a133ca_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-09_7c4d1abece5cc45158b8870875a133ca_icedid.exe
-
Size
382KB
-
MD5
7c4d1abece5cc45158b8870875a133ca
-
SHA1
2e0f11c3925236b68eafa14e441c399416a373d4
-
SHA256
0bfad0ce024c7b6f3f560ed89ad3ef376aa02968aa89b961f4adc96402f25387
-
SHA512
d0ade837acd831210366ca6ce3fa0b3d42c2ed22b87485f473d588ee312894f3685bd26131365973c172ef0e52d792e844c520778f69595762d0abb8b86c9038
-
SSDEEP
6144:1plrlbbDdQaqd2X/96fr3KFEUGjr8uB2WgcA0cpXEVNrvGZ4FUqm6:1plrVbDdQaqdS/ofraFErH8uB2Wm0SXj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2484 thatcomes.exe -
Loads dropped DLL 2 IoCs
pid Process 1952 2024-03-09_7c4d1abece5cc45158b8870875a133ca_icedid.exe 1952 2024-03-09_7c4d1abece5cc45158b8870875a133ca_icedid.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\library\thatcomes.exe 2024-03-09_7c4d1abece5cc45158b8870875a133ca_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1952 2024-03-09_7c4d1abece5cc45158b8870875a133ca_icedid.exe 1952 2024-03-09_7c4d1abece5cc45158b8870875a133ca_icedid.exe 1952 2024-03-09_7c4d1abece5cc45158b8870875a133ca_icedid.exe 1952 2024-03-09_7c4d1abece5cc45158b8870875a133ca_icedid.exe 2484 thatcomes.exe 2484 thatcomes.exe 2484 thatcomes.exe 2484 thatcomes.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2484 1952 2024-03-09_7c4d1abece5cc45158b8870875a133ca_icedid.exe 28 PID 1952 wrote to memory of 2484 1952 2024-03-09_7c4d1abece5cc45158b8870875a133ca_icedid.exe 28 PID 1952 wrote to memory of 2484 1952 2024-03-09_7c4d1abece5cc45158b8870875a133ca_icedid.exe 28 PID 1952 wrote to memory of 2484 1952 2024-03-09_7c4d1abece5cc45158b8870875a133ca_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-09_7c4d1abece5cc45158b8870875a133ca_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-09_7c4d1abece5cc45158b8870875a133ca_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files\library\thatcomes.exe"C:\Program Files\library\thatcomes.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2484
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
382KB
MD556d1662539657c31d4090576ce3ece84
SHA17b87f2d206c819f5b1020c59d6e9f3832a53a34c
SHA2561fc564621ecad8320191526f60e38dec40b63d1d4c143e22d3a460d689a7d063
SHA51228b9341c834fe6638ea9f4be90ae613fcb4fc54e7167541a986774cd8e1c080dc8e57fe68d79e52886696059256d5c7496628b26565b114101b2ebc455844493