Analysis
-
max time kernel
128s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 23:28
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-19_363aff72e3ef2e695297bb1f4a990898_icedid.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-03-19_363aff72e3ef2e695297bb1f4a990898_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-19_363aff72e3ef2e695297bb1f4a990898_icedid.exe
-
Size
419KB
-
MD5
363aff72e3ef2e695297bb1f4a990898
-
SHA1
5685f4e8c3c2d886e35e5d227948e76c952e0438
-
SHA256
4f1ee5394a5f83320a09244537cfec415a1fa3457f75210b6e2f95578270d0bc
-
SHA512
8e9e58558a781d1279e3ece85224e6adf3c68ec294b84d172ee2f3292c41b39790c5797a8eb0606c107f3a59c675342ebed23da3c06f6d190854b4166927938f
-
SSDEEP
12288:RplrVbDdQaqdS/ofraFErH8uB2Wm0SX/Nr5FU:jxRQ+Fucuvm0a/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1240 handling.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\message\handling.exe 2024-03-19_363aff72e3ef2e695297bb1f4a990898_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4948 2024-03-19_363aff72e3ef2e695297bb1f4a990898_icedid.exe 4948 2024-03-19_363aff72e3ef2e695297bb1f4a990898_icedid.exe 4948 2024-03-19_363aff72e3ef2e695297bb1f4a990898_icedid.exe 4948 2024-03-19_363aff72e3ef2e695297bb1f4a990898_icedid.exe 1240 handling.exe 1240 handling.exe 1240 handling.exe 1240 handling.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4948 wrote to memory of 1240 4948 2024-03-19_363aff72e3ef2e695297bb1f4a990898_icedid.exe 97 PID 4948 wrote to memory of 1240 4948 2024-03-19_363aff72e3ef2e695297bb1f4a990898_icedid.exe 97 PID 4948 wrote to memory of 1240 4948 2024-03-19_363aff72e3ef2e695297bb1f4a990898_icedid.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_363aff72e3ef2e695297bb1f4a990898_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-19_363aff72e3ef2e695297bb1f4a990898_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Program Files\message\handling.exe"C:\Program Files\message\handling.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3244 --field-trial-handle=3488,i,1267426273081718772,6254127258555406296,262144 --variations-seed-version /prefetch:81⤵PID:2272
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
419KB
MD5edc9327e61449d8f7b0a5e54e2103de8
SHA18132754fee146ec072dfdc442fa7d6e3999c59ca
SHA25604315dc85f70341359a3c454b13123166eb560d6c35d30d73b35425dc0928589
SHA5123979677979e796e181dfb22243b6c70b2d764f668016c52b834db023b29944cf7071bfeee8824a942329c01d8a65138ad54d63f5cfe26df8774b53c185cc4274