Analysis
-
max time kernel
116s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29-03-2024 03:18
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-29_986cfb7e09899e10d0b5a0fb5a1edc67_icedid.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-03-29_986cfb7e09899e10d0b5a0fb5a1edc67_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-29_986cfb7e09899e10d0b5a0fb5a1edc67_icedid.exe
-
Size
418KB
-
MD5
986cfb7e09899e10d0b5a0fb5a1edc67
-
SHA1
0c5d15f851a43ac49386fa41bcf49fe97bb42f02
-
SHA256
2d27aa955e772c3bbadc07181e6926be97ecb145d9b1356a548462f6d0aae3b5
-
SHA512
c3af4ca306876b10fa91c15b39e10bcea4bf98b5d33fd0c53948ef38517b36bed43d709de86eea0462b6f63e45edd557f1874dc2c6234989816398d0a66c6a3b
-
SSDEEP
12288:7plrVbDdQaqdS/ofraFErH8uB2Wm0SX/Nr5FU:txRQ+Fucuvm0a/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1784 shipped.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\dependant\shipped.exe 2024-03-29_986cfb7e09899e10d0b5a0fb5a1edc67_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4292 2024-03-29_986cfb7e09899e10d0b5a0fb5a1edc67_icedid.exe 4292 2024-03-29_986cfb7e09899e10d0b5a0fb5a1edc67_icedid.exe 4292 2024-03-29_986cfb7e09899e10d0b5a0fb5a1edc67_icedid.exe 4292 2024-03-29_986cfb7e09899e10d0b5a0fb5a1edc67_icedid.exe 1784 shipped.exe 1784 shipped.exe 1784 shipped.exe 1784 shipped.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4292 wrote to memory of 1784 4292 2024-03-29_986cfb7e09899e10d0b5a0fb5a1edc67_icedid.exe 87 PID 4292 wrote to memory of 1784 4292 2024-03-29_986cfb7e09899e10d0b5a0fb5a1edc67_icedid.exe 87 PID 4292 wrote to memory of 1784 4292 2024-03-29_986cfb7e09899e10d0b5a0fb5a1edc67_icedid.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_986cfb7e09899e10d0b5a0fb5a1edc67_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-29_986cfb7e09899e10d0b5a0fb5a1edc67_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Program Files\dependant\shipped.exe"C:\Program Files\dependant\shipped.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1784
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
418KB
MD5c1c270fddbac0b78e0ce7c984a08e28b
SHA1ff5e01780f6885b8ae62f98067f4d3dd7c7aa02e
SHA25664646947c54ab5b762ea22e02824caa4a488f7e3fe90d38890c56060fbe0f54e
SHA512419bc9f2648b314fc10926dc44d54c852bd2fa406dc4a3a23ea61a420f7003fa89023b4263ab433ad48739812d56915e7044ad2fae4c06fbed372d6133a4d9a3