Analysis
-
max time kernel
88s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11-03-2024 23:30
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-11_8a61c34ad8b2bd52014aeed37fc8e1f5_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-11_8a61c34ad8b2bd52014aeed37fc8e1f5_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-03-11_8a61c34ad8b2bd52014aeed37fc8e1f5_icedid.exe
-
Size
269KB
-
MD5
8a61c34ad8b2bd52014aeed37fc8e1f5
-
SHA1
c82a3104776cfc547fc04168045a1b1e9bb68a69
-
SHA256
b09e5cf15200e0668e67e843c76409625297c436a2a731be3f4be16a075c5c97
-
SHA512
7d83ca149e1291966dfacbdfc0077a2660ae6736ca05646522743ee85578b7c51b5387efa8e2f880385e233665dccf0dcee917baab7b6f2a400c5ccfc6b293f4
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3532 agreements.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\contained\agreements.exe 2024-03-11_8a61c34ad8b2bd52014aeed37fc8e1f5_icedid.exe File opened for modification C:\Program Files\contained\agreements.exe 2024-03-11_8a61c34ad8b2bd52014aeed37fc8e1f5_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3536 2024-03-11_8a61c34ad8b2bd52014aeed37fc8e1f5_icedid.exe 3536 2024-03-11_8a61c34ad8b2bd52014aeed37fc8e1f5_icedid.exe 3536 2024-03-11_8a61c34ad8b2bd52014aeed37fc8e1f5_icedid.exe 3536 2024-03-11_8a61c34ad8b2bd52014aeed37fc8e1f5_icedid.exe 3532 agreements.exe 3532 agreements.exe 3532 agreements.exe 3532 agreements.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3536 wrote to memory of 3532 3536 2024-03-11_8a61c34ad8b2bd52014aeed37fc8e1f5_icedid.exe 86 PID 3536 wrote to memory of 3532 3536 2024-03-11_8a61c34ad8b2bd52014aeed37fc8e1f5_icedid.exe 86 PID 3536 wrote to memory of 3532 3536 2024-03-11_8a61c34ad8b2bd52014aeed37fc8e1f5_icedid.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-11_8a61c34ad8b2bd52014aeed37fc8e1f5_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-11_8a61c34ad8b2bd52014aeed37fc8e1f5_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Program Files\contained\agreements.exe"C:\Program Files\contained\agreements.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3532
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
269KB
MD54c3e1918709f188502c9af1f100a8064
SHA1cced93ef42eb53a183142b4d69c8a59cd1dac171
SHA25655eef203713e79dab1d009052795123666227c22c6b29a1f598b4a7350f2cfc6
SHA512db1396ff4de4c6c50f70e6bfa0fe33ac5e73968090851a82501bfbe01c0a6b4014ffd0dd813bc1e5953bba168402696f663c82f40c54b088c7b9c3226d595fca