Analysis
-
max time kernel
145s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
04/04/2024, 21:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-04_1ed74a641a553abeacfbd4737c2e4ee5_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-04_1ed74a641a553abeacfbd4737c2e4ee5_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-04_1ed74a641a553abeacfbd4737c2e4ee5_icedid.exe
-
Size
389KB
-
MD5
1ed74a641a553abeacfbd4737c2e4ee5
-
SHA1
7d552f5b9238d87c5fb74a42f1b99bdc3cc412ba
-
SHA256
0e8484bdcab31231b655059afde2b3f63c1f46b231a464d23326bea3b5c94d5a
-
SHA512
c841f29459920a985b9538c20fb3c44b736ef23b9b55ffb6eda603e32d0e29fdde753d1fb48a0de98f854662b0264bf5c070ea3e66547345bbc466f75869b5f3
-
SSDEEP
12288:dplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:/xRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2852 that.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\games\that.exe 2024-04-04_1ed74a641a553abeacfbd4737c2e4ee5_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1876 2024-04-04_1ed74a641a553abeacfbd4737c2e4ee5_icedid.exe 1876 2024-04-04_1ed74a641a553abeacfbd4737c2e4ee5_icedid.exe 1876 2024-04-04_1ed74a641a553abeacfbd4737c2e4ee5_icedid.exe 1876 2024-04-04_1ed74a641a553abeacfbd4737c2e4ee5_icedid.exe 2852 that.exe 2852 that.exe 2852 that.exe 2852 that.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1876 wrote to memory of 2852 1876 2024-04-04_1ed74a641a553abeacfbd4737c2e4ee5_icedid.exe 86 PID 1876 wrote to memory of 2852 1876 2024-04-04_1ed74a641a553abeacfbd4737c2e4ee5_icedid.exe 86 PID 1876 wrote to memory of 2852 1876 2024-04-04_1ed74a641a553abeacfbd4737c2e4ee5_icedid.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-04_1ed74a641a553abeacfbd4737c2e4ee5_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-04_1ed74a641a553abeacfbd4737c2e4ee5_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Program Files\games\that.exe"C:\Program Files\games\that.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2852
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
389KB
MD50630cf62d563dfacec36a7fddcc3a128
SHA132d5bd2eddd990572b6fa58fd2a24fc030d9bee1
SHA2562b932ad56ed5b648a4fa17473da8435ef0f5e1f2632f86dca24c2b62b463e513
SHA5123eeca3bfb4b8a053ee1f29af72ad7581501d69ec227f0f4f5f971a638ae88cae160ce9d1e0c5c368532a4e9fe20e381c255e75f4b3b95c1c52190910ad7c032b