Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12-03-2024 12:39
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-12_84fbfb5558967e44ac5892db1cb03d8a_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-12_84fbfb5558967e44ac5892db1cb03d8a_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-12_84fbfb5558967e44ac5892db1cb03d8a_icedid.exe
-
Size
416KB
-
MD5
84fbfb5558967e44ac5892db1cb03d8a
-
SHA1
04068b57389539943264e5ef6118f5aedb805f00
-
SHA256
65674218b4986c11c546d904f24f0c0ca14976026e775f7d818e51597a80386e
-
SHA512
500485ad5c2f34d3dfc666c415976418cbae5ecedefec127df8e1adbcd5ec5e73951f95d0cfcea672814a5ede5657e6e2a783c7d4da2ccf86ed013c882a7fefe
-
SSDEEP
12288:JplrVbDdQaqdS/KfraFErH8uB2Wm0SX/Nr5FU:LxRW+Fucuvm0a/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2680 Kaufmann.exe -
Loads dropped DLL 2 IoCs
pid Process 2084 2024-03-12_84fbfb5558967e44ac5892db1cb03d8a_icedid.exe 2084 2024-03-12_84fbfb5558967e44ac5892db1cb03d8a_icedid.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Morgan\Kaufmann.exe 2024-03-12_84fbfb5558967e44ac5892db1cb03d8a_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2084 2024-03-12_84fbfb5558967e44ac5892db1cb03d8a_icedid.exe 2084 2024-03-12_84fbfb5558967e44ac5892db1cb03d8a_icedid.exe 2084 2024-03-12_84fbfb5558967e44ac5892db1cb03d8a_icedid.exe 2084 2024-03-12_84fbfb5558967e44ac5892db1cb03d8a_icedid.exe 2680 Kaufmann.exe 2680 Kaufmann.exe 2680 Kaufmann.exe 2680 Kaufmann.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2680 2084 2024-03-12_84fbfb5558967e44ac5892db1cb03d8a_icedid.exe 28 PID 2084 wrote to memory of 2680 2084 2024-03-12_84fbfb5558967e44ac5892db1cb03d8a_icedid.exe 28 PID 2084 wrote to memory of 2680 2084 2024-03-12_84fbfb5558967e44ac5892db1cb03d8a_icedid.exe 28 PID 2084 wrote to memory of 2680 2084 2024-03-12_84fbfb5558967e44ac5892db1cb03d8a_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-12_84fbfb5558967e44ac5892db1cb03d8a_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-12_84fbfb5558967e44ac5892db1cb03d8a_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files\Morgan\Kaufmann.exe"C:\Program Files\Morgan\Kaufmann.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2680
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
417KB
MD532dc5818fd2d8f24a809f31bb776a0c2
SHA16fd6ec25b7031734a18b0634605d1ec406a8487e
SHA256be49d171aa0b0e4bc2a45d1a11f10ac4cd57b3b273e35deb3c727441010b8075
SHA5123436895b410f88e43b2a162d89878de40d0aeafc96ba338d08dfa1497c4c0369dc95bf0df33f638669b2cf6464d21264ee330bcca02947f531f8703e0f9bce0c