Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2024, 00:41
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-29_658a7c9f20ff00834e98764225f7f1eb_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-29_658a7c9f20ff00834e98764225f7f1eb_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-29_658a7c9f20ff00834e98764225f7f1eb_icedid.exe
-
Size
270KB
-
MD5
658a7c9f20ff00834e98764225f7f1eb
-
SHA1
f37a55f0b8a2410c1997c4d8b4ddd78e5e913c87
-
SHA256
d20ae04e2b753ac83be24ab0d236b129686d0073d05096cf1b3df72432d5f5df
-
SHA512
fd6b1e35df12009d280c6bcdea2064036c3779bb19f42e472076689676544887fc65948484fcd9e30756a7b3038a6a17f01f1bb8eb263ca9bf4cc532df5f191a
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4036 match.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\build\match.exe 2024-03-29_658a7c9f20ff00834e98764225f7f1eb_icedid.exe File opened for modification C:\Program Files\build\match.exe 2024-03-29_658a7c9f20ff00834e98764225f7f1eb_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4652 2024-03-29_658a7c9f20ff00834e98764225f7f1eb_icedid.exe 4652 2024-03-29_658a7c9f20ff00834e98764225f7f1eb_icedid.exe 4652 2024-03-29_658a7c9f20ff00834e98764225f7f1eb_icedid.exe 4652 2024-03-29_658a7c9f20ff00834e98764225f7f1eb_icedid.exe 4036 match.exe 4036 match.exe 4036 match.exe 4036 match.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4652 wrote to memory of 4036 4652 2024-03-29_658a7c9f20ff00834e98764225f7f1eb_icedid.exe 87 PID 4652 wrote to memory of 4036 4652 2024-03-29_658a7c9f20ff00834e98764225f7f1eb_icedid.exe 87 PID 4652 wrote to memory of 4036 4652 2024-03-29_658a7c9f20ff00834e98764225f7f1eb_icedid.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_658a7c9f20ff00834e98764225f7f1eb_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-29_658a7c9f20ff00834e98764225f7f1eb_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Program Files\build\match.exe"C:\Program Files\build\match.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4036
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
270KB
MD5635d8a44aac8f6f9321dbd60868d3865
SHA1585fde320650365035f7acb3a11d647d4ca63bfe
SHA2560c979eed81e75f3c7e8f0e4240464ccf000aec637a335fa586a46e8f3be0b376
SHA512b0c8d5e7abf33b4c8581296d496cb4d703d16c419d4f2388b20b4b00d0058f8bc59e5f2909786eb4518630de758ddbe23d32186c8c3014cbbafafa518fe8ad93