Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
10/03/2024, 02:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-10_708f735b0a4bb2fb03bb517a1bb64c58_icedid.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-03-10_708f735b0a4bb2fb03bb517a1bb64c58_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-10_708f735b0a4bb2fb03bb517a1bb64c58_icedid.exe
-
Size
279KB
-
MD5
708f735b0a4bb2fb03bb517a1bb64c58
-
SHA1
120640843dcf6ea899efd5bc9fdfa8b508736420
-
SHA256
c080aa74653626b01a87c899926939bd81fc4d7578a6f560d3de838d6005c6a4
-
SHA512
cb60c90226ce8e03972fd79a767f86cf26eafdc823fdd48ec82c8bf611756a0af167ab40755bb56a4afc8d3e827288655dbb913f97b7274b72a77376764a08f6
-
SSDEEP
3072:lxUm75Fku3eKeO213SJReOqdmErj+HyHnNVIPL/+ybbiW1u46Q7qV3lU8xM:fU8Dk11CJ1qDWUNVIT/bblS9x
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2792 GetVersion.exe -
Loads dropped DLL 2 IoCs
pid Process 2960 2024-03-10_708f735b0a4bb2fb03bb517a1bb64c58_icedid.exe 2960 2024-03-10_708f735b0a4bb2fb03bb517a1bb64c58_icedid.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Sample\GetVersion.exe 2024-03-10_708f735b0a4bb2fb03bb517a1bb64c58_icedid.exe File opened for modification C:\Program Files\Sample\GetVersion.exe 2024-03-10_708f735b0a4bb2fb03bb517a1bb64c58_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2960 2024-03-10_708f735b0a4bb2fb03bb517a1bb64c58_icedid.exe 2960 2024-03-10_708f735b0a4bb2fb03bb517a1bb64c58_icedid.exe 2960 2024-03-10_708f735b0a4bb2fb03bb517a1bb64c58_icedid.exe 2960 2024-03-10_708f735b0a4bb2fb03bb517a1bb64c58_icedid.exe 2792 GetVersion.exe 2792 GetVersion.exe 2792 GetVersion.exe 2792 GetVersion.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2792 2960 2024-03-10_708f735b0a4bb2fb03bb517a1bb64c58_icedid.exe 28 PID 2960 wrote to memory of 2792 2960 2024-03-10_708f735b0a4bb2fb03bb517a1bb64c58_icedid.exe 28 PID 2960 wrote to memory of 2792 2960 2024-03-10_708f735b0a4bb2fb03bb517a1bb64c58_icedid.exe 28 PID 2960 wrote to memory of 2792 2960 2024-03-10_708f735b0a4bb2fb03bb517a1bb64c58_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-10_708f735b0a4bb2fb03bb517a1bb64c58_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-10_708f735b0a4bb2fb03bb517a1bb64c58_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Program Files\Sample\GetVersion.exe"C:\Program Files\Sample\GetVersion.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2792
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
279KB
MD58793cbc1627b04cf7e9abf9c360bafcc
SHA12f57a764e32927da3846a2de672117b6dca6a3c8
SHA256d9dc19f10c137cab2dfa2de65d897bdc3240f9f611335f5703bc1d1c40e89f43
SHA512b855e47e53762af6d7691c759bfa1784b2ba39a8e4eeb921110feed7583ed6d008c8463764f4d8d801b91ef4b2e158f1ae0a413b6fbfd2e9276f829cb3925e1f