Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 00:33
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-13_73e52ea8316edeba8ceebb93dd929ee4_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-13_73e52ea8316edeba8ceebb93dd929ee4_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-13_73e52ea8316edeba8ceebb93dd929ee4_icedid.exe
-
Size
267KB
-
MD5
73e52ea8316edeba8ceebb93dd929ee4
-
SHA1
c58f8fe7906641820ff1101bb67d3d84f3e40c01
-
SHA256
4245a59518e7504d96a94a69f472fd490a1ffea205cc739861aefad997dc5727
-
SHA512
cc4ffc464ffba9160a3d9c2a4253f3b4e151bb1bfab755f4abd0893e344d20690e5a256ad299625c2fee152d36212d01e5eef62bba041e204e83a9bdcb8f8582
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4384 Custom.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Standard\Custom.exe 2024-03-13_73e52ea8316edeba8ceebb93dd929ee4_icedid.exe File opened for modification C:\Program Files\Standard\Custom.exe 2024-03-13_73e52ea8316edeba8ceebb93dd929ee4_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 884 2024-03-13_73e52ea8316edeba8ceebb93dd929ee4_icedid.exe 884 2024-03-13_73e52ea8316edeba8ceebb93dd929ee4_icedid.exe 884 2024-03-13_73e52ea8316edeba8ceebb93dd929ee4_icedid.exe 884 2024-03-13_73e52ea8316edeba8ceebb93dd929ee4_icedid.exe 4384 Custom.exe 4384 Custom.exe 4384 Custom.exe 4384 Custom.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 884 wrote to memory of 4384 884 2024-03-13_73e52ea8316edeba8ceebb93dd929ee4_icedid.exe 101 PID 884 wrote to memory of 4384 884 2024-03-13_73e52ea8316edeba8ceebb93dd929ee4_icedid.exe 101 PID 884 wrote to memory of 4384 884 2024-03-13_73e52ea8316edeba8ceebb93dd929ee4_icedid.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-13_73e52ea8316edeba8ceebb93dd929ee4_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-13_73e52ea8316edeba8ceebb93dd929ee4_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Program Files\Standard\Custom.exe"C:\Program Files\Standard\Custom.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4032 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:81⤵PID:1000
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
267KB
MD595399a0226808cb63ef1e9e00c4ceb99
SHA19bf861274adcc2800608c1d270108e888524122b
SHA2564f679de265b454363ee78b4546e01c1b687b765bf4e8cd9f0738eb58eb0d1cae
SHA5124ade935cfaafb8dd451b672a7f55a97e22054f835dcb0d9b86f468b25dca98d10db234675aa894b6af493007f1609c6e3f71ff8a958adacf29688c12bf633828