Analysis
-
max time kernel
91s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2024, 02:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-10_137752ab2b026b819b3f577652f888ad_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-10_137752ab2b026b819b3f577652f888ad_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-03-10_137752ab2b026b819b3f577652f888ad_icedid.exe
-
Size
268KB
-
MD5
137752ab2b026b819b3f577652f888ad
-
SHA1
cbd3fe31436ddd836c4dda2b1857e01d980bad5e
-
SHA256
9f5e21eea8d276306e86f4a5455e71743b2070e451713cd2211da92ef21fcdaf
-
SHA512
aeda0ee47520763ccbf96b2d477b2b26b8715ce8a74bc86822ccc41e29bbd25c8fd713f2ed24f9426a4f10ba1a2b1ad71012edb70cdc08c832576f2e690f2fdf
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3360 command.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\Call\command.exe 2024-03-10_137752ab2b026b819b3f577652f888ad_icedid.exe File created C:\Program Files\Call\command.exe 2024-03-10_137752ab2b026b819b3f577652f888ad_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4512 2024-03-10_137752ab2b026b819b3f577652f888ad_icedid.exe 4512 2024-03-10_137752ab2b026b819b3f577652f888ad_icedid.exe 4512 2024-03-10_137752ab2b026b819b3f577652f888ad_icedid.exe 4512 2024-03-10_137752ab2b026b819b3f577652f888ad_icedid.exe 3360 command.exe 3360 command.exe 3360 command.exe 3360 command.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4512 wrote to memory of 3360 4512 2024-03-10_137752ab2b026b819b3f577652f888ad_icedid.exe 84 PID 4512 wrote to memory of 3360 4512 2024-03-10_137752ab2b026b819b3f577652f888ad_icedid.exe 84 PID 4512 wrote to memory of 3360 4512 2024-03-10_137752ab2b026b819b3f577652f888ad_icedid.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-10_137752ab2b026b819b3f577652f888ad_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-10_137752ab2b026b819b3f577652f888ad_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Program Files\Call\command.exe"C:\Program Files\Call\command.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3360
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268KB
MD5712d84e96cf1cf756e2d3dead65abf29
SHA1913f2fa570fa8257eca284de962d1e0607b7ae12
SHA256c4054fbcb62dd250ed8db9d8694cce440a835cf2e4d84f7dace6a2b526c9538c
SHA512a69522fa80c0e29922cc91cfc86a3aa716453d86a47047eae842434a0be93c4e5e832382da8d284cc4c0135c500536ebaa0ca672c4185152da05a34ab45cdf1d