Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2024 21:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-19_7735943e17f83f8df0d7ffa5deeda412_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-19_7735943e17f83f8df0d7ffa5deeda412_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-19_7735943e17f83f8df0d7ffa5deeda412_icedid.exe
-
Size
319KB
-
MD5
7735943e17f83f8df0d7ffa5deeda412
-
SHA1
28fe52628fd1de7d88c7f4e77e9af5d98061a7b0
-
SHA256
e36edef11426ce958b5b66ec22618657fa29d074af3520fbdbc00517070652e7
-
SHA512
92af2dda698941c9a1e3bbb22f2a0556635257ff9f498129fb1c3ff0f38322226932245b21fab863883443bdbdfaa77d95fe9a27d40a9d05c3223361163638f6
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4784 instead.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\future\instead.exe 2024-03-19_7735943e17f83f8df0d7ffa5deeda412_icedid.exe File created C:\Program Files\future\instead.exe 2024-03-19_7735943e17f83f8df0d7ffa5deeda412_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 552 2024-03-19_7735943e17f83f8df0d7ffa5deeda412_icedid.exe 552 2024-03-19_7735943e17f83f8df0d7ffa5deeda412_icedid.exe 552 2024-03-19_7735943e17f83f8df0d7ffa5deeda412_icedid.exe 552 2024-03-19_7735943e17f83f8df0d7ffa5deeda412_icedid.exe 4784 instead.exe 4784 instead.exe 4784 instead.exe 4784 instead.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 552 wrote to memory of 4784 552 2024-03-19_7735943e17f83f8df0d7ffa5deeda412_icedid.exe 96 PID 552 wrote to memory of 4784 552 2024-03-19_7735943e17f83f8df0d7ffa5deeda412_icedid.exe 96 PID 552 wrote to memory of 4784 552 2024-03-19_7735943e17f83f8df0d7ffa5deeda412_icedid.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_7735943e17f83f8df0d7ffa5deeda412_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-19_7735943e17f83f8df0d7ffa5deeda412_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Program Files\future\instead.exe"C:\Program Files\future\instead.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1380 --field-trial-handle=2496,i,15897292497548307209,13920214570023230813,262144 --variations-seed-version /prefetch:81⤵PID:552
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
319KB
MD5ead1b14180f6c4e9cfeb8d1f8b10794a
SHA165d0eae8fd5014c918f20ec07e1690abfac77f2d
SHA256bb2ed526beaffa11ce47a60851178dffa235c0c195838bfc9bf96ccf7ee90775
SHA512aeef965b5db839255d9a994762ab3a1931bac5e8304169cf7afed617b0fe7980ab6ff3c451e3b76801d631222c849d5c130493899983f2bf2b051f78ca0325b2