Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18-03-2024 16:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-18_1451cffaba30a1519778fa071b65be79_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-18_1451cffaba30a1519778fa071b65be79_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-18_1451cffaba30a1519778fa071b65be79_icedid.exe
-
Size
266KB
-
MD5
1451cffaba30a1519778fa071b65be79
-
SHA1
963080ce2ad63fb6095bd5269edb92d71d3c8d93
-
SHA256
b37bb220699dd970c2df93a6da07808aab5bdd4ece83c2a7cec86ba423b47107
-
SHA512
c069c29057940ecd6499ff98c3d63b4438c6fe01ef3f6f7f82f7ce5f4405bebcb2536ce3bfbeda9e72769ce77627d7da58a67894c2898d494a28b99d1632efde
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3648 redistribution.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\runtime\redistribution.exe 2024-03-18_1451cffaba30a1519778fa071b65be79_icedid.exe File created C:\Program Files\runtime\redistribution.exe 2024-03-18_1451cffaba30a1519778fa071b65be79_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3512 2024-03-18_1451cffaba30a1519778fa071b65be79_icedid.exe 3512 2024-03-18_1451cffaba30a1519778fa071b65be79_icedid.exe 3512 2024-03-18_1451cffaba30a1519778fa071b65be79_icedid.exe 3512 2024-03-18_1451cffaba30a1519778fa071b65be79_icedid.exe 3648 redistribution.exe 3648 redistribution.exe 3648 redistribution.exe 3648 redistribution.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3512 wrote to memory of 3648 3512 2024-03-18_1451cffaba30a1519778fa071b65be79_icedid.exe 97 PID 3512 wrote to memory of 3648 3512 2024-03-18_1451cffaba30a1519778fa071b65be79_icedid.exe 97 PID 3512 wrote to memory of 3648 3512 2024-03-18_1451cffaba30a1519778fa071b65be79_icedid.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-18_1451cffaba30a1519778fa071b65be79_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-18_1451cffaba30a1519778fa071b65be79_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Program Files\runtime\redistribution.exe"C:\Program Files\runtime\redistribution.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3908 --field-trial-handle=2280,i,4114443225282860369,4764091921472631035,262144 --variations-seed-version /prefetch:81⤵PID:4816
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
267KB
MD5d57ee33c2afae0126122ad9c3dfef7a8
SHA10250eda2f3e23dd49124d6075cc0e70eab89ea2e
SHA2561039b18920b315fff98d9b60218e4681f5ea046581b99b2bc00acce7fb8cd04e
SHA51201f3df05277125a130909142c52e8ff959d5b7ae53512ecaf3d10d2b41de1036192367471cd773b1d1a9898003296bee40d5e83f7080a061db6a9d511535d28a