Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/03/2024, 05:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-12_45ce1d29d6b57faa7331f178ee13f2bd_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-12_45ce1d29d6b57faa7331f178ee13f2bd_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-12_45ce1d29d6b57faa7331f178ee13f2bd_icedid.exe
-
Size
318KB
-
MD5
45ce1d29d6b57faa7331f178ee13f2bd
-
SHA1
5476c87845ee86b854a8c23d1179c7953fada0a3
-
SHA256
62358c4b770f3ee7fbb4c2b1686becf5cb97f205fbb58a30cdc309e2e1d493d2
-
SHA512
8cf05ccb48cc91cfeb2909e5e3cd184e18cc1c1aa2dc76f969b5964627ddb49adb9c0261837487ac9af96f9ddf0b3df2c4c776176d7bc8dd592e27a295c563e2
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2848 Security.exe -
Loads dropped DLL 2 IoCs
pid Process 2304 2024-03-12_45ce1d29d6b57faa7331f178ee13f2bd_icedid.exe 2304 2024-03-12_45ce1d29d6b57faa7331f178ee13f2bd_icedid.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Graphics\Security.exe 2024-03-12_45ce1d29d6b57faa7331f178ee13f2bd_icedid.exe File opened for modification C:\Program Files\Graphics\Security.exe 2024-03-12_45ce1d29d6b57faa7331f178ee13f2bd_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2304 2024-03-12_45ce1d29d6b57faa7331f178ee13f2bd_icedid.exe 2304 2024-03-12_45ce1d29d6b57faa7331f178ee13f2bd_icedid.exe 2304 2024-03-12_45ce1d29d6b57faa7331f178ee13f2bd_icedid.exe 2304 2024-03-12_45ce1d29d6b57faa7331f178ee13f2bd_icedid.exe 2848 Security.exe 2848 Security.exe 2848 Security.exe 2848 Security.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2848 2304 2024-03-12_45ce1d29d6b57faa7331f178ee13f2bd_icedid.exe 28 PID 2304 wrote to memory of 2848 2304 2024-03-12_45ce1d29d6b57faa7331f178ee13f2bd_icedid.exe 28 PID 2304 wrote to memory of 2848 2304 2024-03-12_45ce1d29d6b57faa7331f178ee13f2bd_icedid.exe 28 PID 2304 wrote to memory of 2848 2304 2024-03-12_45ce1d29d6b57faa7331f178ee13f2bd_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-12_45ce1d29d6b57faa7331f178ee13f2bd_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-12_45ce1d29d6b57faa7331f178ee13f2bd_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Program Files\Graphics\Security.exe"C:\Program Files\Graphics\Security.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2848
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
318KB
MD54c70c00e84d371f81b2c4fdd89456d0e
SHA19d210e17dce8dbee89969d04a9bbf1c22d4cef07
SHA2560850e39dde649697429828198f19dd531e541a69142fb7c166bcf45e76cf340f
SHA51202ad69d53ff5373a5ed5012c0413f4dbc972e8d311fe4791e0634a036db7c108d97ab31538bfe1a81d090111c27a444957c5c5e589cdb6c6e2b67de5fab3bec6