Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
19/03/2024, 01:17
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-19_e2920d94136399a9aa504d12803bfe68_icedid.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-03-19_e2920d94136399a9aa504d12803bfe68_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-19_e2920d94136399a9aa504d12803bfe68_icedid.exe
-
Size
269KB
-
MD5
e2920d94136399a9aa504d12803bfe68
-
SHA1
971f60526378e72489abee5d7b77370044567305
-
SHA256
da5ebf930880178e98c0d31c9f9beb2f06863768377ae46e32091f840cf7a912
-
SHA512
8f4700466b06c3ebcba4ad62f78ade619af2e8273a0380863873df25d91eb93474f097457841f85b6bdcd8f45ce458d262f94352a94580f1a50322def61219ac
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2780 points.exe -
Loads dropped DLL 2 IoCs
pid Process 2592 2024-03-19_e2920d94136399a9aa504d12803bfe68_icedid.exe 2592 2024-03-19_e2920d94136399a9aa504d12803bfe68_icedid.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\lpszRootPath\points.exe 2024-03-19_e2920d94136399a9aa504d12803bfe68_icedid.exe File opened for modification C:\Program Files\lpszRootPath\points.exe 2024-03-19_e2920d94136399a9aa504d12803bfe68_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2592 2024-03-19_e2920d94136399a9aa504d12803bfe68_icedid.exe 2592 2024-03-19_e2920d94136399a9aa504d12803bfe68_icedid.exe 2592 2024-03-19_e2920d94136399a9aa504d12803bfe68_icedid.exe 2592 2024-03-19_e2920d94136399a9aa504d12803bfe68_icedid.exe 2780 points.exe 2780 points.exe 2780 points.exe 2780 points.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2592 wrote to memory of 2780 2592 2024-03-19_e2920d94136399a9aa504d12803bfe68_icedid.exe 28 PID 2592 wrote to memory of 2780 2592 2024-03-19_e2920d94136399a9aa504d12803bfe68_icedid.exe 28 PID 2592 wrote to memory of 2780 2592 2024-03-19_e2920d94136399a9aa504d12803bfe68_icedid.exe 28 PID 2592 wrote to memory of 2780 2592 2024-03-19_e2920d94136399a9aa504d12803bfe68_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_e2920d94136399a9aa504d12803bfe68_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-19_e2920d94136399a9aa504d12803bfe68_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Program Files\lpszRootPath\points.exe"C:\Program Files\lpszRootPath\points.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2780
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
269KB
MD564b10764bd193fac3675df5cba527b1c
SHA1aecb3eed7ecb82f851167670d417089132c47e8b
SHA256748a11a484ebc2066cefcfcbc63c06fe20f4bd4e7ffa71ac83d4b039f3fdd646
SHA51222911d4a4ff390ce9fa4580a633b923566cee6c074327fdf4a689a95994c1cb938c2293ecba2ffa1397eae7a76a6eca3ec60caf55c9cdc99d01d4d7394cfc980