Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2024 13:39
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-28_76cebaef908aecfc90d556054f8bcb42_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-28_76cebaef908aecfc90d556054f8bcb42_icedid.exe
Resource
win10v2004-20240319-en
General
-
Target
2024-03-28_76cebaef908aecfc90d556054f8bcb42_icedid.exe
-
Size
418KB
-
MD5
76cebaef908aecfc90d556054f8bcb42
-
SHA1
90ee0ea296502b00dfc37cd3e3b9fecb2a457751
-
SHA256
8086e8f17e9742b3daf6420072121e5a4591b0f8b859794bbb1d2bc90700fe9d
-
SHA512
7924c5905d1cd88124da884ec964032fd0c853269b439230859a7ea95c5fc607326a215fec15b222ba5ee4aca7eea942e9c66017bcbd3ec7cba2dd6576d94815
-
SSDEEP
12288:GplrVbDdQaqdS/ofraFErH8uB2Wm0SX/Nr5FU:ixRQ+Fucuvm0a/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5072 Internals.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Debugging\Internals.exe 2024-03-28_76cebaef908aecfc90d556054f8bcb42_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3964 2024-03-28_76cebaef908aecfc90d556054f8bcb42_icedid.exe 3964 2024-03-28_76cebaef908aecfc90d556054f8bcb42_icedid.exe 3964 2024-03-28_76cebaef908aecfc90d556054f8bcb42_icedid.exe 3964 2024-03-28_76cebaef908aecfc90d556054f8bcb42_icedid.exe 5072 Internals.exe 5072 Internals.exe 5072 Internals.exe 5072 Internals.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3964 wrote to memory of 5072 3964 2024-03-28_76cebaef908aecfc90d556054f8bcb42_icedid.exe 97 PID 3964 wrote to memory of 5072 3964 2024-03-28_76cebaef908aecfc90d556054f8bcb42_icedid.exe 97 PID 3964 wrote to memory of 5072 3964 2024-03-28_76cebaef908aecfc90d556054f8bcb42_icedid.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_76cebaef908aecfc90d556054f8bcb42_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-28_76cebaef908aecfc90d556054f8bcb42_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Program Files\Debugging\Internals.exe"C:\Program Files\Debugging\Internals.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3776 --field-trial-handle=2264,i,1475924722205134884,16549311107360026087,262144 --variations-seed-version /prefetch:81⤵PID:1520
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
418KB
MD5728e311b4d30e74c293e8d389c5a5f1b
SHA10e1d60119dae43bd48c29fe3e93edf14b39353f1
SHA25624f572ba469224997f28b6a61e7996a942202305699db1158f4adeccfed34148
SHA5125d2b69ece3bcc8f29bf9edb1b7e203f61a11e6969fe9e6435b392b99d882f9885b05c6b3356adb3e647b4fc15b66a56932e409bf52f78b2db66b9d8065c7d467