Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 18:50
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-12_58a33fc9f880549fbb1caf383cd5c24f_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-12_58a33fc9f880549fbb1caf383cd5c24f_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-12_58a33fc9f880549fbb1caf383cd5c24f_icedid.exe
-
Size
418KB
-
MD5
58a33fc9f880549fbb1caf383cd5c24f
-
SHA1
529b9fc224378e7c10728072d1a9315caac76315
-
SHA256
0aa2af9c4a575443105fadae6b4fbbc54ceaacf9abc6418e9123db9b9353967d
-
SHA512
49d2e9661cd277acfa0146c980dcd9d7cdf7098997e6802d18b41da08a30b1e70488298c97a2917da3e03f007abe1665d79c16c67d2b0e2d63c0c0540e58a2ac
-
SSDEEP
12288:5plrVbDdQaqdS/KfraFErH8uB2Wm0SX/Nr5FU:7xRW+Fucuvm0a/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2540 directory.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\root\directory.exe 2024-03-12_58a33fc9f880549fbb1caf383cd5c24f_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 744 2024-03-12_58a33fc9f880549fbb1caf383cd5c24f_icedid.exe 744 2024-03-12_58a33fc9f880549fbb1caf383cd5c24f_icedid.exe 744 2024-03-12_58a33fc9f880549fbb1caf383cd5c24f_icedid.exe 744 2024-03-12_58a33fc9f880549fbb1caf383cd5c24f_icedid.exe 2540 directory.exe 2540 directory.exe 2540 directory.exe 2540 directory.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 744 wrote to memory of 2540 744 2024-03-12_58a33fc9f880549fbb1caf383cd5c24f_icedid.exe 88 PID 744 wrote to memory of 2540 744 2024-03-12_58a33fc9f880549fbb1caf383cd5c24f_icedid.exe 88 PID 744 wrote to memory of 2540 744 2024-03-12_58a33fc9f880549fbb1caf383cd5c24f_icedid.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-12_58a33fc9f880549fbb1caf383cd5c24f_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-12_58a33fc9f880549fbb1caf383cd5c24f_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Program Files\root\directory.exe"C:\Program Files\root\directory.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
418KB
MD5132bcb6c07d7059555ac2de6aad4d33d
SHA1f5b1229fa93691e800645c754fcb8fe7dd5fa7ee
SHA256c9ff8f8f25ab6a2d7554db1f2b116b846c949361fa4cbcfbbb571de9c5919e3d
SHA5120c4c30254fa6772744ff550211ac6fa2c7c319db00036f64961188ff0b0c396e113c5d4ec1decf11c1c47850d8605e92546d4bdf8699454cffb6c4aecc402d87
-
Filesize
325KB
MD50b570829b4f7f145bd925294e4e01914
SHA1c7d47d794547a36edd3e33b9d6bb430fd5ff369b
SHA2569997c7324ac28516afb32c86a0f92b02c3dd345adb4b34286217f8a422720094
SHA5124b5aa6a2ecb702b83f243c9b301ef453c6a21a4470e8d7daabceb6e28c43918eb17bb8f4854885015ceae75249b34951f412f529e07036b3749ff3eab6743631