Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/03/2024, 01:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-13_8db348ee67937fc92e17e7ee3c8520af_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-13_8db348ee67937fc92e17e7ee3c8520af_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-13_8db348ee67937fc92e17e7ee3c8520af_icedid.exe
-
Size
430KB
-
MD5
8db348ee67937fc92e17e7ee3c8520af
-
SHA1
5274a12c0daf1819214a730774027b09a0ed30db
-
SHA256
de7bdbc4ea0fed77368fb5bd6a6b57af7f8227baa58cdbe5f132281e64d84291
-
SHA512
386b00840ed3a84843ad6cb306c0dc4c1a2d636ef3211776af2dc659d6a4311c74e4cf4c0f8a86f85cfe8952c550be99a5de151906d4ce9433f1187f69cf4adb
-
SSDEEP
12288:rplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:dxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2576 Composition.exe -
Loads dropped DLL 2 IoCs
pid Process 1152 2024-03-13_8db348ee67937fc92e17e7ee3c8520af_icedid.exe 1152 2024-03-13_8db348ee67937fc92e17e7ee3c8520af_icedid.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Synthesis\Composition.exe 2024-03-13_8db348ee67937fc92e17e7ee3c8520af_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1152 2024-03-13_8db348ee67937fc92e17e7ee3c8520af_icedid.exe 1152 2024-03-13_8db348ee67937fc92e17e7ee3c8520af_icedid.exe 1152 2024-03-13_8db348ee67937fc92e17e7ee3c8520af_icedid.exe 1152 2024-03-13_8db348ee67937fc92e17e7ee3c8520af_icedid.exe 2576 Composition.exe 2576 Composition.exe 2576 Composition.exe 2576 Composition.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1152 wrote to memory of 2576 1152 2024-03-13_8db348ee67937fc92e17e7ee3c8520af_icedid.exe 28 PID 1152 wrote to memory of 2576 1152 2024-03-13_8db348ee67937fc92e17e7ee3c8520af_icedid.exe 28 PID 1152 wrote to memory of 2576 1152 2024-03-13_8db348ee67937fc92e17e7ee3c8520af_icedid.exe 28 PID 1152 wrote to memory of 2576 1152 2024-03-13_8db348ee67937fc92e17e7ee3c8520af_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-13_8db348ee67937fc92e17e7ee3c8520af_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-13_8db348ee67937fc92e17e7ee3c8520af_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Program Files\Synthesis\Composition.exe"C:\Program Files\Synthesis\Composition.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2576
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
431KB
MD5cc75b4cbc940549c3f128817c88c440a
SHA1db23bdb9ecc3c2c467820af6f427aeda162a2c97
SHA256ef1c4d9564b72e5130b3f70124098c2e78401423fb2035bef7c51a6ee89e6d1c
SHA512bc87b197c3daab9b5dba077e1e16b5ca84cb62fc2b8767395a66602c13db67cd135808e7fd1e35f9308da555403c5cb782596a2d7e5b110a1af9f3f2d19d44f8