Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 22:03
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-27_e6ea77db71a55a14f40e31e8eaa33818_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-27_e6ea77db71a55a14f40e31e8eaa33818_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-27_e6ea77db71a55a14f40e31e8eaa33818_icedid.exe
-
Size
2.3MB
-
MD5
e6ea77db71a55a14f40e31e8eaa33818
-
SHA1
d27c8769f37716f130ac5210e5738efcf165b5a7
-
SHA256
6404d2edbeb89ea73448a084d20ec8dc035b0e9d0adb06f50b67a0257c76988a
-
SHA512
9010910553c69a367b9d9a33b585826405e3c5f1e24527da677456a729da9a4a5964776c4bfd1b51b24d564e9ea9cf07ce9a108d476703d3cae5965a98293a20
-
SSDEEP
49152:sH2BHlLfYcpvmE0SukeNfiAD03yy/cP7jjwV/YnDnHW/I8E60p1aLcD3:sAFLYcv0vfD03yy/cP/FnHW/I8EDaLu3
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2024-03-27_e6ea77db71a55a14f40e31e8eaa33818_icedid.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 2024-03-27_e6ea77db71a55a14f40e31e8eaa33818_icedid.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2216 2024-03-27_e6ea77db71a55a14f40e31e8eaa33818_icedid.exe