Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19/03/2024, 19:40
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-19_758d23e9bab9909c30f53465ac8173e6_icedid.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-03-19_758d23e9bab9909c30f53465ac8173e6_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-19_758d23e9bab9909c30f53465ac8173e6_icedid.exe
-
Size
268KB
-
MD5
758d23e9bab9909c30f53465ac8173e6
-
SHA1
fb1cb02f7980c6f31cd4c22f1e9ae8fd70e21dac
-
SHA256
1603690ab5f4d16f9028d8167996c01d3ee929e61125573e4b7510c5a386d319
-
SHA512
e6c11ed278e696003efc08d470b790019a9147889fcb870ac481676741c3d65a41f7fe68e92581e3dd10dfc9c67e55bde0a3e8378299e559184f261159928dd9
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2384 optional.exe -
Loads dropped DLL 2 IoCs
pid Process 1752 2024-03-19_758d23e9bab9909c30f53465ac8173e6_icedid.exe 1752 2024-03-19_758d23e9bab9909c30f53465ac8173e6_icedid.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\released\optional.exe 2024-03-19_758d23e9bab9909c30f53465ac8173e6_icedid.exe File opened for modification C:\Program Files\released\optional.exe 2024-03-19_758d23e9bab9909c30f53465ac8173e6_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1752 2024-03-19_758d23e9bab9909c30f53465ac8173e6_icedid.exe 1752 2024-03-19_758d23e9bab9909c30f53465ac8173e6_icedid.exe 1752 2024-03-19_758d23e9bab9909c30f53465ac8173e6_icedid.exe 1752 2024-03-19_758d23e9bab9909c30f53465ac8173e6_icedid.exe 2384 optional.exe 2384 optional.exe 2384 optional.exe 2384 optional.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1752 wrote to memory of 2384 1752 2024-03-19_758d23e9bab9909c30f53465ac8173e6_icedid.exe 28 PID 1752 wrote to memory of 2384 1752 2024-03-19_758d23e9bab9909c30f53465ac8173e6_icedid.exe 28 PID 1752 wrote to memory of 2384 1752 2024-03-19_758d23e9bab9909c30f53465ac8173e6_icedid.exe 28 PID 1752 wrote to memory of 2384 1752 2024-03-19_758d23e9bab9909c30f53465ac8173e6_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_758d23e9bab9909c30f53465ac8173e6_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-19_758d23e9bab9909c30f53465ac8173e6_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Program Files\released\optional.exe"C:\Program Files\released\optional.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2384
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268KB
MD5ff2da8ebde301861b5920e4554f68d7b
SHA17e210dce8c1dcc00d07f60af427fc62da1b0a1aa
SHA2569cb00316ee21b3d1c18cb481c442db928f60c6acc1edd5f8fe548ea9a45252ed
SHA512371d4f177f8faa9835b860f113da367a4e27e30b1f628dabfaec08e61512ae3baf013a05b755d6bcb5cb7998e8e10458b24377f50ffb9d8aad36fe929fd58a73