Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 19:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-27_2f1faa154e7834a4052566a95ba69458_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-27_2f1faa154e7834a4052566a95ba69458_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-27_2f1faa154e7834a4052566a95ba69458_icedid.exe
-
Size
419KB
-
MD5
2f1faa154e7834a4052566a95ba69458
-
SHA1
8db4ee1613e24e8c82988d700710f52a0f6c9a9f
-
SHA256
959e1680e3787614315780685aeef59183e3d9e30a84340305e19df3cac60c2c
-
SHA512
0c5c8ac39d86d10cf632cca8502ae97d50bb38599ac223b03dda6272fa2955d7d156d1db4fb2d8e5a6883d9cdb1ba5ff44e17677a39366ffb76d2f0d77fbe64d
-
SSDEEP
12288:EplrVbDdQaqdS/KfraFErH8uB2Wm0SX/Nr5FU:AxRW+Fucuvm0a/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2224 that.exe -
Loads dropped DLL 2 IoCs
pid Process 1196 2024-03-27_2f1faa154e7834a4052566a95ba69458_icedid.exe 1196 2024-03-27_2f1faa154e7834a4052566a95ba69458_icedid.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\games\that.exe 2024-03-27_2f1faa154e7834a4052566a95ba69458_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1196 2024-03-27_2f1faa154e7834a4052566a95ba69458_icedid.exe 1196 2024-03-27_2f1faa154e7834a4052566a95ba69458_icedid.exe 1196 2024-03-27_2f1faa154e7834a4052566a95ba69458_icedid.exe 1196 2024-03-27_2f1faa154e7834a4052566a95ba69458_icedid.exe 2224 that.exe 2224 that.exe 2224 that.exe 2224 that.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1196 wrote to memory of 2224 1196 2024-03-27_2f1faa154e7834a4052566a95ba69458_icedid.exe 28 PID 1196 wrote to memory of 2224 1196 2024-03-27_2f1faa154e7834a4052566a95ba69458_icedid.exe 28 PID 1196 wrote to memory of 2224 1196 2024-03-27_2f1faa154e7834a4052566a95ba69458_icedid.exe 28 PID 1196 wrote to memory of 2224 1196 2024-03-27_2f1faa154e7834a4052566a95ba69458_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-27_2f1faa154e7834a4052566a95ba69458_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-27_2f1faa154e7834a4052566a95ba69458_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Program Files\games\that.exe"C:\Program Files\games\that.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2224
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
419KB
MD5d0d8abf0b4cc57fa4bc2931b6110d084
SHA115f54d7e998bd5a8923041bdd8090c05583134ad
SHA256c888c3946f0e0c4274c5d3cbe8b94430bf964e60f85408b6fb233d4bd9675e2d
SHA5120c179a67106bfeeaa67ec7349e6be11e9e7ebd6ace46343a70ff3d923dbbb725738c5cf91c8b0e3ec32670393501baec9f37e4654fdb2a9e90ca74a3644bd7ec