Analysis
-
max time kernel
158s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 19:02
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-12_fe12b4ae5b3aa10a6d827ccc4db6b4d5_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-12_fe12b4ae5b3aa10a6d827ccc4db6b4d5_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-12_fe12b4ae5b3aa10a6d827ccc4db6b4d5_icedid.exe
-
Size
2.3MB
-
MD5
fe12b4ae5b3aa10a6d827ccc4db6b4d5
-
SHA1
dbc9b2f652256aca658ab75b745d8e3dcbdad0ec
-
SHA256
26ffb8b30840da2edb07aa2b1dc4c4e227177ef7b2d3ea6c46aa11eda387b2c6
-
SHA512
737d04dd07bbabc7b4ec95276b6c45eb2b2c953034a77a730c51a8b09c31ec5dfb086dfbde6fafe2eca94f0e34d44305c19b15414b6101d6a6f3284233913c9f
-
SSDEEP
49152:pUAUbSzk85yKaYHjetifFZxf4jMGxV1XL4v5kFLBLw76:+AUbSz950YHjeti9HGMGxV1XGmFLBLK
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4952 35D0.tmp -
Drops file in Program Files directory 6 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\7zCon.sfx 35D0.tmp File opened for modification C:\Program Files\7-Zip\Uninstall.exe 35D0.tmp File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems32.dll 35D0.tmp File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2R32.dll 35D0.tmp File opened for modification C:\Program Files\Microsoft Office\root\Integration\Addons\OneDriveSetup.exe 35D0.tmp File opened for modification C:\Program Files\7-Zip\7z.sfx 35D0.tmp -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1212 2024-03-12_fe12b4ae5b3aa10a6d827ccc4db6b4d5_icedid.exe 1212 2024-03-12_fe12b4ae5b3aa10a6d827ccc4db6b4d5_icedid.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1212 2024-03-12_fe12b4ae5b3aa10a6d827ccc4db6b4d5_icedid.exe 1212 2024-03-12_fe12b4ae5b3aa10a6d827ccc4db6b4d5_icedid.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1212 2024-03-12_fe12b4ae5b3aa10a6d827ccc4db6b4d5_icedid.exe 1212 2024-03-12_fe12b4ae5b3aa10a6d827ccc4db6b4d5_icedid.exe 1212 2024-03-12_fe12b4ae5b3aa10a6d827ccc4db6b4d5_icedid.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1212 wrote to memory of 4952 1212 2024-03-12_fe12b4ae5b3aa10a6d827ccc4db6b4d5_icedid.exe 98 PID 1212 wrote to memory of 4952 1212 2024-03-12_fe12b4ae5b3aa10a6d827ccc4db6b4d5_icedid.exe 98 PID 1212 wrote to memory of 4952 1212 2024-03-12_fe12b4ae5b3aa10a6d827ccc4db6b4d5_icedid.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-12_fe12b4ae5b3aa10a6d827ccc4db6b4d5_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-12_fe12b4ae5b3aa10a6d827ccc4db6b4d5_icedid.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\35D0.tmpC:\Users\Admin\AppData\Local\Temp\35D0.tmp2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4160 --field-trial-handle=2304,i,6987730730348465820,3913273227385401271,262144 --variations-seed-version /prefetch:81⤵PID:3004
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145KB
MD5c610e7ccd6859872c585b2a85d7dc992
SHA1362b3d4b72e3add687c209c79b500b7c6a246d46
SHA25614063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041
SHA5128570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666