Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-03-2024 00:30
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-28_378e90786a62ac42d08e146244fa6cde_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-28_378e90786a62ac42d08e146244fa6cde_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-28_378e90786a62ac42d08e146244fa6cde_icedid.exe
-
Size
419KB
-
MD5
378e90786a62ac42d08e146244fa6cde
-
SHA1
6fbf2f28fe650d803c2d9c794d578af9fe675bf9
-
SHA256
94edd6d50c27b6f22b5d2dc16bf202773718355c589d73bd9f3cbea838609f6b
-
SHA512
187d596a3b6a6456fc967b86609c4857f6bc9646837d1ce203b4f3d320f54084169a3fdeced1a5906cf5c95d3851a0f01e04d038681b2f981213b5aab088b213
-
SSDEEP
12288:mplrVbDdQaqdS/ofraFErH8uB2Wm0SX/Nr5FU:CxRQ+Fucuvm0a/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1676 points.exe -
Loads dropped DLL 2 IoCs
pid Process 1612 2024-03-28_378e90786a62ac42d08e146244fa6cde_icedid.exe 1612 2024-03-28_378e90786a62ac42d08e146244fa6cde_icedid.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\lpszRootPath\points.exe 2024-03-28_378e90786a62ac42d08e146244fa6cde_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1612 2024-03-28_378e90786a62ac42d08e146244fa6cde_icedid.exe 1612 2024-03-28_378e90786a62ac42d08e146244fa6cde_icedid.exe 1612 2024-03-28_378e90786a62ac42d08e146244fa6cde_icedid.exe 1612 2024-03-28_378e90786a62ac42d08e146244fa6cde_icedid.exe 1676 points.exe 1676 points.exe 1676 points.exe 1676 points.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1612 wrote to memory of 1676 1612 2024-03-28_378e90786a62ac42d08e146244fa6cde_icedid.exe 28 PID 1612 wrote to memory of 1676 1612 2024-03-28_378e90786a62ac42d08e146244fa6cde_icedid.exe 28 PID 1612 wrote to memory of 1676 1612 2024-03-28_378e90786a62ac42d08e146244fa6cde_icedid.exe 28 PID 1612 wrote to memory of 1676 1612 2024-03-28_378e90786a62ac42d08e146244fa6cde_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_378e90786a62ac42d08e146244fa6cde_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-28_378e90786a62ac42d08e146244fa6cde_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Program Files\lpszRootPath\points.exe"C:\Program Files\lpszRootPath\points.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1676
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
419KB
MD525cb4cdb23d27cfac7eb6e32397f7cda
SHA15ec4ee0d960b1a87f45dbde3e6bea7e19f77bf8e
SHA25617e23bf988eff73f446a3b3273b0b27dbc9bd1b836048a8de83778d6107e5dc1
SHA512cea7474783be4be63e175d4a1599f37fcebec62bf4248d20178d70c8669959d33088b23de90c4c8927a35c2bc5f89b225d638960d4f879934a77b8e783369442