Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/03/2024, 16:33
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-25_61ff33456ed3b24695a2c46c3dc97cda_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-25_61ff33456ed3b24695a2c46c3dc97cda_icedid.exe
Resource
win10v2004-20240319-en
General
-
Target
2024-03-25_61ff33456ed3b24695a2c46c3dc97cda_icedid.exe
-
Size
390KB
-
MD5
61ff33456ed3b24695a2c46c3dc97cda
-
SHA1
5c2761e5de6f1fa8bfd3b280fbcb3f594b1d865a
-
SHA256
9d44ef089752998f70ce3957fd8624984e7ca2d85dc8dd9176704a92578156fa
-
SHA512
8eff7c4592b6b80d912065afee7b087308a3721bc11a91d8a0c0dce26a5558a6d151b4764cb54fdec7dd44f8da0ea24fbbae851319f15f3627830ad1c581a3b3
-
SSDEEP
12288:wplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:MxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2244 Enabling.exe -
Loads dropped DLL 2 IoCs
pid Process 1136 2024-03-25_61ff33456ed3b24695a2c46c3dc97cda_icedid.exe 1136 2024-03-25_61ff33456ed3b24695a2c46c3dc97cda_icedid.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Custom\Enabling.exe 2024-03-25_61ff33456ed3b24695a2c46c3dc97cda_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1136 2024-03-25_61ff33456ed3b24695a2c46c3dc97cda_icedid.exe 1136 2024-03-25_61ff33456ed3b24695a2c46c3dc97cda_icedid.exe 1136 2024-03-25_61ff33456ed3b24695a2c46c3dc97cda_icedid.exe 1136 2024-03-25_61ff33456ed3b24695a2c46c3dc97cda_icedid.exe 2244 Enabling.exe 2244 Enabling.exe 2244 Enabling.exe 2244 Enabling.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1136 wrote to memory of 2244 1136 2024-03-25_61ff33456ed3b24695a2c46c3dc97cda_icedid.exe 28 PID 1136 wrote to memory of 2244 1136 2024-03-25_61ff33456ed3b24695a2c46c3dc97cda_icedid.exe 28 PID 1136 wrote to memory of 2244 1136 2024-03-25_61ff33456ed3b24695a2c46c3dc97cda_icedid.exe 28 PID 1136 wrote to memory of 2244 1136 2024-03-25_61ff33456ed3b24695a2c46c3dc97cda_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-25_61ff33456ed3b24695a2c46c3dc97cda_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-25_61ff33456ed3b24695a2c46c3dc97cda_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Program Files\Custom\Enabling.exe"C:\Program Files\Custom\Enabling.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2244
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
390KB
MD5b3283abb9307be0faafc3459f7e814bd
SHA1ace0755c8a446fb33ecdff2238e51368bee7b994
SHA2562c509fe3fc744701cb77858e41e3d606518332ca7ef9ebe14e086a2fb6cb084f
SHA5128060dc1357e375cc2e0f51dbe209fee171eb335f7c9c0702f68e418cdeb51640427977a3e8a48615fe65c3876c630bbf6c4e8b78f99a8b15e26fc7b49c3dea5e