Analysis
-
max time kernel
140s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16-03-2024 10:35
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-16_82b3d9e9b14906cb250b450245e44763_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-16_82b3d9e9b14906cb250b450245e44763_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-16_82b3d9e9b14906cb250b450245e44763_icedid.exe
-
Size
417KB
-
MD5
82b3d9e9b14906cb250b450245e44763
-
SHA1
7e720c0c522d81b809ed5b4ff6121d12c8b55500
-
SHA256
c5e108cea03c84916529216389eed66e241e138b1dfa519fe386b7702f7b6077
-
SHA512
37569442ba6ae001a087d349062ac732c14db5a19c640082f198ac7b7bbeb916921c6c0bab71a55ac560eb46341ba907ff6cdc00e5ea22a09e7c9f4a266dede9
-
SSDEEP
12288:cplrVbDdQaqdS/ofraFErH8uB2Wm0SX/Nr5FU:oxRQ+Fucuvm0a/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4252 languages.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\supports\languages.exe 2024-03-16_82b3d9e9b14906cb250b450245e44763_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3924 2024-03-16_82b3d9e9b14906cb250b450245e44763_icedid.exe 3924 2024-03-16_82b3d9e9b14906cb250b450245e44763_icedid.exe 3924 2024-03-16_82b3d9e9b14906cb250b450245e44763_icedid.exe 3924 2024-03-16_82b3d9e9b14906cb250b450245e44763_icedid.exe 4252 languages.exe 4252 languages.exe 4252 languages.exe 4252 languages.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3924 wrote to memory of 4252 3924 2024-03-16_82b3d9e9b14906cb250b450245e44763_icedid.exe 101 PID 3924 wrote to memory of 4252 3924 2024-03-16_82b3d9e9b14906cb250b450245e44763_icedid.exe 101 PID 3924 wrote to memory of 4252 3924 2024-03-16_82b3d9e9b14906cb250b450245e44763_icedid.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-16_82b3d9e9b14906cb250b450245e44763_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-16_82b3d9e9b14906cb250b450245e44763_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Program Files\supports\languages.exe"C:\Program Files\supports\languages.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3864 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:81⤵PID:3956
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
418KB
MD58dbcf2ff6eafef26f789d494231c5e4e
SHA1c4050812bf7f8b0c8085bf022aa80bc44fb40c63
SHA25663e271783c0c67bc77147959c00b105c1a19c3c3c0fe16c652bd51e7e9b02715
SHA512fc327f56b6336d2535790f8a95ddcc4f1b7c07c7c64645f216db07320f9744dfa8dd7867a5c12e20b3f083b3c98646792a92f20230b7a4cb4850d11e4008d519