Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/03/2024, 03:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-29_695dd967a32ca17d1f8590ffab6db5a3_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-29_695dd967a32ca17d1f8590ffab6db5a3_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-29_695dd967a32ca17d1f8590ffab6db5a3_icedid.exe
-
Size
386KB
-
MD5
695dd967a32ca17d1f8590ffab6db5a3
-
SHA1
9250c7f77a31572ebf5f3a720f68baa6c6c3ad21
-
SHA256
542543cf5d66d32eff36cdc7489f908fa52c8cc27ecb38e9304ab722f63752c4
-
SHA512
6685f8a342ebfe10099974b647cb80f8e9ef21539f03d909c31a050d1090e3f398effe066768c5007e5c83c2048534dd598a0dc1dc9652d2f4288ed6b711b8fe
-
SSDEEP
12288:4plrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:kxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2940 Japanese.exe -
Loads dropped DLL 2 IoCs
pid Process 2356 2024-03-29_695dd967a32ca17d1f8590ffab6db5a3_icedid.exe 2356 2024-03-29_695dd967a32ca17d1f8590ffab6db5a3_icedid.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Italian\Japanese.exe 2024-03-29_695dd967a32ca17d1f8590ffab6db5a3_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2356 2024-03-29_695dd967a32ca17d1f8590ffab6db5a3_icedid.exe 2356 2024-03-29_695dd967a32ca17d1f8590ffab6db5a3_icedid.exe 2356 2024-03-29_695dd967a32ca17d1f8590ffab6db5a3_icedid.exe 2356 2024-03-29_695dd967a32ca17d1f8590ffab6db5a3_icedid.exe 2940 Japanese.exe 2940 Japanese.exe 2940 Japanese.exe 2940 Japanese.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2940 2356 2024-03-29_695dd967a32ca17d1f8590ffab6db5a3_icedid.exe 28 PID 2356 wrote to memory of 2940 2356 2024-03-29_695dd967a32ca17d1f8590ffab6db5a3_icedid.exe 28 PID 2356 wrote to memory of 2940 2356 2024-03-29_695dd967a32ca17d1f8590ffab6db5a3_icedid.exe 28 PID 2356 wrote to memory of 2940 2356 2024-03-29_695dd967a32ca17d1f8590ffab6db5a3_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_695dd967a32ca17d1f8590ffab6db5a3_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-29_695dd967a32ca17d1f8590ffab6db5a3_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Program Files\Italian\Japanese.exe"C:\Program Files\Italian\Japanese.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2940
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
386KB
MD5553a6cbd81c02a997a54c6513b09edd9
SHA183def0a91240439c4b01f29dc0ccddf213137ccf
SHA256f4f7d18ec0bd7e9f8104d1873c4ce7dee3cf8e389b8209ca34f06289e4b29656
SHA5129e7d003ba208913096d84f50b50e86df6c8d5be85d51bf87e879a135b98c5a32cfdc4682c8651771b20d14a524af1016eb0d304f13d6e0efb72a7626b3e619e0