Analysis
-
max time kernel
157s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-03-2024 19:57
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-26_c36a83abc74549a96c9b1a951f11f153_icedid.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-03-26_c36a83abc74549a96c9b1a951f11f153_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-26_c36a83abc74549a96c9b1a951f11f153_icedid.exe
-
Size
384KB
-
MD5
c36a83abc74549a96c9b1a951f11f153
-
SHA1
bce99a2b13b93c76bb961d51c2916cd1b286ae3d
-
SHA256
cd91181c9043693c36684fe29a8a2859fb075590615a83b304b9c088e164ab4b
-
SHA512
d2c07d0c840130b10b42ad3d1f76b7d50bf20c87ef3ee14bc26683dfb6f9e5e4e3e8e298395333078cdb618979d943c6d8d70fc2f4e4835f694c6123bb131be3
-
SSDEEP
12288:8plrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:IxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1576 Suppress.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\indicator\Suppress.exe 2024-03-26_c36a83abc74549a96c9b1a951f11f153_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2200 2024-03-26_c36a83abc74549a96c9b1a951f11f153_icedid.exe 2200 2024-03-26_c36a83abc74549a96c9b1a951f11f153_icedid.exe 2200 2024-03-26_c36a83abc74549a96c9b1a951f11f153_icedid.exe 2200 2024-03-26_c36a83abc74549a96c9b1a951f11f153_icedid.exe 1576 Suppress.exe 1576 Suppress.exe 1576 Suppress.exe 1576 Suppress.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2200 wrote to memory of 1576 2200 2024-03-26_c36a83abc74549a96c9b1a951f11f153_icedid.exe 90 PID 2200 wrote to memory of 1576 2200 2024-03-26_c36a83abc74549a96c9b1a951f11f153_icedid.exe 90 PID 2200 wrote to memory of 1576 2200 2024-03-26_c36a83abc74549a96c9b1a951f11f153_icedid.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-26_c36a83abc74549a96c9b1a951f11f153_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-26_c36a83abc74549a96c9b1a951f11f153_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Program Files\indicator\Suppress.exe"C:\Program Files\indicator\Suppress.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1576
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD59528b1ac3e7514344cf553bec46614c2
SHA1099dbdb1d1d1ad2fdf2c4b0a45df8ef7e7a27cfc
SHA256c2be3dcf94952b5061d18e6259dbdf7e5658a7ad1f95b0944c0f25b0d2d8944b
SHA512bf850c0af73cd737194190f4954c05624b45826e2e8f7a125e60dd6e68aa95858b3813c62db00d4b774de5f48a63acadfdbe32d431827ffb637472167198d900