Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2024, 19:55
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-25_a4768e2a88652c568748e6849070fa19_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-25_a4768e2a88652c568748e6849070fa19_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-25_a4768e2a88652c568748e6849070fa19_icedid.exe
-
Size
320KB
-
MD5
a4768e2a88652c568748e6849070fa19
-
SHA1
3cf5ec3488e5890b677ef215ba269f935eaca956
-
SHA256
03f688efe71be8d7434b5760abedc855515776875b1f7d07c540eb32a1008a5a
-
SHA512
9b70c81c240a416960022fcd9c519e25b35475a91df819dde2fe5b7f8a3ef6b9e504da1947c519696ca011af6d589a3dee682a746385970efbf020923af253ee
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3892 languages.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\supports\languages.exe 2024-03-25_a4768e2a88652c568748e6849070fa19_icedid.exe File opened for modification C:\Program Files\supports\languages.exe 2024-03-25_a4768e2a88652c568748e6849070fa19_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 5060 2024-03-25_a4768e2a88652c568748e6849070fa19_icedid.exe 5060 2024-03-25_a4768e2a88652c568748e6849070fa19_icedid.exe 5060 2024-03-25_a4768e2a88652c568748e6849070fa19_icedid.exe 5060 2024-03-25_a4768e2a88652c568748e6849070fa19_icedid.exe 3892 languages.exe 3892 languages.exe 3892 languages.exe 3892 languages.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5060 wrote to memory of 3892 5060 2024-03-25_a4768e2a88652c568748e6849070fa19_icedid.exe 89 PID 5060 wrote to memory of 3892 5060 2024-03-25_a4768e2a88652c568748e6849070fa19_icedid.exe 89 PID 5060 wrote to memory of 3892 5060 2024-03-25_a4768e2a88652c568748e6849070fa19_icedid.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-25_a4768e2a88652c568748e6849070fa19_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-25_a4768e2a88652c568748e6849070fa19_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Program Files\supports\languages.exe"C:\Program Files\supports\languages.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3892
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD5019c8f7157b6ec969fd34a48f7419f6d
SHA10b0d8491287d9c405399e897f49579a1946a347e
SHA2565779fd19a317a5e91c5e40804ab46fda082f8afe9dc999c5b8ff67258566a6ec
SHA512ddbd26e4a41fc9cc7e7490c77fc1c36e06351c0a6c212b8928f1154e9d1ef5c0aa7a02882382ff8245fa0608d33bfd4fb7fa3ae06ccc08c7ed760a08a7fc4523