Analysis
-
max time kernel
140s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2024 23:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-19_9a067a657139b250ebbe78657829861b_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-19_9a067a657139b250ebbe78657829861b_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-19_9a067a657139b250ebbe78657829861b_icedid.exe
-
Size
316KB
-
MD5
9a067a657139b250ebbe78657829861b
-
SHA1
05eee6ccc57fc039f47a391503bdb4a47401e7e8
-
SHA256
2970db90e2971f3a8c555961a567fc24ffd18d9e54415e0a4f98d7f4c43d8932
-
SHA512
87da5eacba78d85e8cfa14688412ec5e5583bd7d751b1fc7dcbd59f6ebb04897c3528a8ba678dce91ac339c414bb921935e3131af4115972d2d91c674eb9cfa3
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2632 future.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\December\future.exe 2024-03-19_9a067a657139b250ebbe78657829861b_icedid.exe File opened for modification C:\Program Files\December\future.exe 2024-03-19_9a067a657139b250ebbe78657829861b_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1688 2024-03-19_9a067a657139b250ebbe78657829861b_icedid.exe 1688 2024-03-19_9a067a657139b250ebbe78657829861b_icedid.exe 1688 2024-03-19_9a067a657139b250ebbe78657829861b_icedid.exe 1688 2024-03-19_9a067a657139b250ebbe78657829861b_icedid.exe 2632 future.exe 2632 future.exe 2632 future.exe 2632 future.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2632 1688 2024-03-19_9a067a657139b250ebbe78657829861b_icedid.exe 88 PID 1688 wrote to memory of 2632 1688 2024-03-19_9a067a657139b250ebbe78657829861b_icedid.exe 88 PID 1688 wrote to memory of 2632 1688 2024-03-19_9a067a657139b250ebbe78657829861b_icedid.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_9a067a657139b250ebbe78657829861b_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-19_9a067a657139b250ebbe78657829861b_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files\December\future.exe"C:\Program Files\December\future.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2632
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD582712a533c0e4b572daa1916092b9995
SHA1fffc6205b92d258ff0b8c9cff966ee05b2f29e6f
SHA2562aeee314038829f0da6d40b1583773c31568284c23bff0e44ccf2dca27f543a5
SHA512f1cdd8103494a784f452da5777814d4ca56a2f64e76af155a40e6447c517add95c389c8a7a55907fc991f17ed599a56d7d4d9b0bce1f185e76fdad1723564a62
-
Filesize
44KB
MD557d1f711973acc3b187b5be57568e7cb
SHA1354b0cae2118a56e5a4ae1757479d21707e064ff
SHA256156c69d918274b20a9e3e6822d61ac9b0e13f7dc31977d1b1549aba29125ee50
SHA5121464cfd83b82f38fa8f3fcd6473258e737dc0ffc4e543004a2e5de9b8ea6e1a3687e4a4776cf2e0778e784666883271a426d4b5c300056000290610788534fed