Analysis
-
max time kernel
119s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/04/2024, 21:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-04_1ed74a641a553abeacfbd4737c2e4ee5_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-04_1ed74a641a553abeacfbd4737c2e4ee5_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-04_1ed74a641a553abeacfbd4737c2e4ee5_icedid.exe
-
Size
389KB
-
MD5
1ed74a641a553abeacfbd4737c2e4ee5
-
SHA1
7d552f5b9238d87c5fb74a42f1b99bdc3cc412ba
-
SHA256
0e8484bdcab31231b655059afde2b3f63c1f46b231a464d23326bea3b5c94d5a
-
SHA512
c841f29459920a985b9538c20fb3c44b736ef23b9b55ffb6eda603e32d0e29fdde753d1fb48a0de98f854662b0264bf5c070ea3e66547345bbc466f75869b5f3
-
SSDEEP
12288:dplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:/xRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2376 games.exe -
Loads dropped DLL 2 IoCs
pid Process 1736 2024-04-04_1ed74a641a553abeacfbd4737c2e4ee5_icedid.exe 1736 2024-04-04_1ed74a641a553abeacfbd4737c2e4ee5_icedid.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\and\games.exe 2024-04-04_1ed74a641a553abeacfbd4737c2e4ee5_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1736 2024-04-04_1ed74a641a553abeacfbd4737c2e4ee5_icedid.exe 1736 2024-04-04_1ed74a641a553abeacfbd4737c2e4ee5_icedid.exe 1736 2024-04-04_1ed74a641a553abeacfbd4737c2e4ee5_icedid.exe 1736 2024-04-04_1ed74a641a553abeacfbd4737c2e4ee5_icedid.exe 2376 games.exe 2376 games.exe 2376 games.exe 2376 games.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2376 1736 2024-04-04_1ed74a641a553abeacfbd4737c2e4ee5_icedid.exe 28 PID 1736 wrote to memory of 2376 1736 2024-04-04_1ed74a641a553abeacfbd4737c2e4ee5_icedid.exe 28 PID 1736 wrote to memory of 2376 1736 2024-04-04_1ed74a641a553abeacfbd4737c2e4ee5_icedid.exe 28 PID 1736 wrote to memory of 2376 1736 2024-04-04_1ed74a641a553abeacfbd4737c2e4ee5_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-04_1ed74a641a553abeacfbd4737c2e4ee5_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-04_1ed74a641a553abeacfbd4737c2e4ee5_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Program Files\and\games.exe"C:\Program Files\and\games.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2376
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
389KB
MD520120993f77ef16976f1982cccfe72cc
SHA144e231227445bd7848d16443256da68cf6700a27
SHA2569ec3009d8249084c87bffdc92e4f52e5484315c17ab4460819d3063d8bca9296
SHA5121d16b0ef03b16e5c3590bcce12b6666439ec92c88cacee284a630b4ed96be8680b81cdbce6cb0d3ca3b20a8a6a5a7d26afac27965b112d9abbdaf143e87d9c87