Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-03-2024 06:40
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-09_d5c61b9d4d9e42d723c37ebe71259887_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-09_d5c61b9d4d9e42d723c37ebe71259887_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-09_d5c61b9d4d9e42d723c37ebe71259887_icedid.exe
-
Size
320KB
-
MD5
d5c61b9d4d9e42d723c37ebe71259887
-
SHA1
7ace1d33530f6f54569c49dc30d4982faac98277
-
SHA256
84b05c459aae04987075346b83b62d5db0d4cbc133414dd65f8477c736107773
-
SHA512
3531491df39e052330d87ebd6af8249da82e7b05dcf6bdf78bced60c7c57cbfc429bcf9fbefbdb4a8be20da922fe8f383e637ff8641e4078dadd57d77dee1b90
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4088 optional.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\released\optional.exe 2024-03-09_d5c61b9d4d9e42d723c37ebe71259887_icedid.exe File opened for modification C:\Program Files\released\optional.exe 2024-03-09_d5c61b9d4d9e42d723c37ebe71259887_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2320 2024-03-09_d5c61b9d4d9e42d723c37ebe71259887_icedid.exe 2320 2024-03-09_d5c61b9d4d9e42d723c37ebe71259887_icedid.exe 2320 2024-03-09_d5c61b9d4d9e42d723c37ebe71259887_icedid.exe 2320 2024-03-09_d5c61b9d4d9e42d723c37ebe71259887_icedid.exe 4088 optional.exe 4088 optional.exe 4088 optional.exe 4088 optional.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2320 wrote to memory of 4088 2320 2024-03-09_d5c61b9d4d9e42d723c37ebe71259887_icedid.exe 89 PID 2320 wrote to memory of 4088 2320 2024-03-09_d5c61b9d4d9e42d723c37ebe71259887_icedid.exe 89 PID 2320 wrote to memory of 4088 2320 2024-03-09_d5c61b9d4d9e42d723c37ebe71259887_icedid.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-09_d5c61b9d4d9e42d723c37ebe71259887_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-09_d5c61b9d4d9e42d723c37ebe71259887_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files\released\optional.exe"C:\Program Files\released\optional.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4088
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD5cc38cb2798e6a19603b4543decfce1a9
SHA1e68c40421cf527c1c312502f5c6373f13ce230a9
SHA2568a6f09eea341bcd12f4f131cd5bedd742475516ad590cbf5061b9a49c456b114
SHA512d634fe10ba1c731eaa390c00107496983810905c3b194efcab515341b6f9ebfd2615a5df390928ecaf75d97401626d316bb10048242c9ca11895429f4cc71622