Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 14:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-27_c9deba9234bd31f46cf7d07c3155ff4f_icedid.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-03-27_c9deba9234bd31f46cf7d07c3155ff4f_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-27_c9deba9234bd31f46cf7d07c3155ff4f_icedid.exe
-
Size
322KB
-
MD5
c9deba9234bd31f46cf7d07c3155ff4f
-
SHA1
de0e91dfede09283aa8caeda7b8921fce413b433
-
SHA256
9e82cf9dac9193dc6854d8f47924198249a92a91150d543b14a55814d504868f
-
SHA512
35a96c2b64749b408f52d3d89fc5ee1480301ec5797a54d3a3ad15baefcc98c1fc8474ff25a80417951922b252360800976a613909b6a466d635d8fd233ba220
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 836 points.exe -
Loads dropped DLL 2 IoCs
pid Process 2468 2024-03-27_c9deba9234bd31f46cf7d07c3155ff4f_icedid.exe 2468 2024-03-27_c9deba9234bd31f46cf7d07c3155ff4f_icedid.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\lpszRootPath\points.exe 2024-03-27_c9deba9234bd31f46cf7d07c3155ff4f_icedid.exe File opened for modification C:\Program Files\lpszRootPath\points.exe 2024-03-27_c9deba9234bd31f46cf7d07c3155ff4f_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2468 2024-03-27_c9deba9234bd31f46cf7d07c3155ff4f_icedid.exe 2468 2024-03-27_c9deba9234bd31f46cf7d07c3155ff4f_icedid.exe 2468 2024-03-27_c9deba9234bd31f46cf7d07c3155ff4f_icedid.exe 2468 2024-03-27_c9deba9234bd31f46cf7d07c3155ff4f_icedid.exe 836 points.exe 836 points.exe 836 points.exe 836 points.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2468 wrote to memory of 836 2468 2024-03-27_c9deba9234bd31f46cf7d07c3155ff4f_icedid.exe 28 PID 2468 wrote to memory of 836 2468 2024-03-27_c9deba9234bd31f46cf7d07c3155ff4f_icedid.exe 28 PID 2468 wrote to memory of 836 2468 2024-03-27_c9deba9234bd31f46cf7d07c3155ff4f_icedid.exe 28 PID 2468 wrote to memory of 836 2468 2024-03-27_c9deba9234bd31f46cf7d07c3155ff4f_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-27_c9deba9234bd31f46cf7d07c3155ff4f_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-27_c9deba9234bd31f46cf7d07c3155ff4f_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Program Files\lpszRootPath\points.exe"C:\Program Files\lpszRootPath\points.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:836
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
322KB
MD530ba1bcaaaf50929189aee008258827d
SHA15cfbed7ca14b5af75f9c30ebb0ec72d5b893ddde
SHA256e07801a24eada114e2c81595ddf76a189a9b51b13bb7f965a229d760875b0579
SHA5121e4cbbae9198af8ed247eb5734660f84830e55cb3194dba6e05dbe7301231e8a5265eb60fc5b28c8bf3ce43cb17ffac69ba49b6a30278b8f124540e3af436b46