Analysis
-
max time kernel
96s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
04-04-2024 23:23
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-04_1520503d710f23aa6b789949785129e7_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-04_1520503d710f23aa6b789949785129e7_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-04_1520503d710f23aa6b789949785129e7_icedid.exe
-
Size
419KB
-
MD5
1520503d710f23aa6b789949785129e7
-
SHA1
93671368b3b6278da3e3447daf1ced3c724abb62
-
SHA256
b7ec396b51e912bf5d6333b59da3921126857ab30a2c0a33114533fcb4a88e42
-
SHA512
d8d2a0f4432b5b18d1695ea527144e1afbac44bc72bffc60e3252d9622f31fe69b1185af6af311822344165c6bf9753a03a235d641cdbbd0e11f84e8c00c6ca1
-
SSDEEP
12288:rplrVbDdQaqdS/ofraFErH8uB2Wm0SX/Nr5FU:dxRQ+Fucuvm0a/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1840 Reference.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\facilitates\Reference.exe 2024-04-04_1520503d710f23aa6b789949785129e7_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1824 2024-04-04_1520503d710f23aa6b789949785129e7_icedid.exe 1824 2024-04-04_1520503d710f23aa6b789949785129e7_icedid.exe 1824 2024-04-04_1520503d710f23aa6b789949785129e7_icedid.exe 1824 2024-04-04_1520503d710f23aa6b789949785129e7_icedid.exe 1840 Reference.exe 1840 Reference.exe 1840 Reference.exe 1840 Reference.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1824 wrote to memory of 1840 1824 2024-04-04_1520503d710f23aa6b789949785129e7_icedid.exe 88 PID 1824 wrote to memory of 1840 1824 2024-04-04_1520503d710f23aa6b789949785129e7_icedid.exe 88 PID 1824 wrote to memory of 1840 1824 2024-04-04_1520503d710f23aa6b789949785129e7_icedid.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-04_1520503d710f23aa6b789949785129e7_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-04_1520503d710f23aa6b789949785129e7_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Program Files\facilitates\Reference.exe"C:\Program Files\facilitates\Reference.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1840
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
419KB
MD592d34a6a18086034257fc96a017d471c
SHA16c7a56a49fb05af30941dfd9be0a7177a1293237
SHA256a6b575dd7a2d58774edfc8b2054fc360a98d0d082fca8c494af23de8c7e4f49d
SHA5129619af0b67f3de4b5624ee4411902bb24984ec1c2cdb32771f01f88e371b8f8fbda5f073b099ada0a20c7d5f02145b4b1610672a7b6eb2cfb78b0c87ece9b833