Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
04/04/2024, 23:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-04_2ef6799e32af586ec81e974d23f4ee14_icedid.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-04_2ef6799e32af586ec81e974d23f4ee14_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-04_2ef6799e32af586ec81e974d23f4ee14_icedid.exe
-
Size
380KB
-
MD5
2ef6799e32af586ec81e974d23f4ee14
-
SHA1
c6c6dce5a0a6563f3c181eeef39c9d79fe7bea0c
-
SHA256
e3b4b558785ff343c7fa6dc6fed4eddb45b0639f68a1121fc99065a640ef973d
-
SHA512
476987fd5a9b879ab21b4279b34bb117b3777e9b03a0ed4a6b03ed514f571b6b7f0ff7ae7792ca996bc1237ed3c667a54c96682f320d841e57de17df461ece63
-
SSDEEP
6144:4plrlbbDdQaqd2X/96fr3KFEUGjr8uB2WgcA0cpXEVNrvGZ4FUqm6:4plrVbDdQaqdS/ofraFErH8uB2Wm0SXj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2224 necessary.exe -
Loads dropped DLL 2 IoCs
pid Process 2204 2024-04-04_2ef6799e32af586ec81e974d23f4ee14_icedid.exe 2204 2024-04-04_2ef6799e32af586ec81e974d23f4ee14_icedid.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\function\necessary.exe 2024-04-04_2ef6799e32af586ec81e974d23f4ee14_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2204 2024-04-04_2ef6799e32af586ec81e974d23f4ee14_icedid.exe 2204 2024-04-04_2ef6799e32af586ec81e974d23f4ee14_icedid.exe 2204 2024-04-04_2ef6799e32af586ec81e974d23f4ee14_icedid.exe 2204 2024-04-04_2ef6799e32af586ec81e974d23f4ee14_icedid.exe 2224 necessary.exe 2224 necessary.exe 2224 necessary.exe 2224 necessary.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2224 2204 2024-04-04_2ef6799e32af586ec81e974d23f4ee14_icedid.exe 28 PID 2204 wrote to memory of 2224 2204 2024-04-04_2ef6799e32af586ec81e974d23f4ee14_icedid.exe 28 PID 2204 wrote to memory of 2224 2204 2024-04-04_2ef6799e32af586ec81e974d23f4ee14_icedid.exe 28 PID 2204 wrote to memory of 2224 2204 2024-04-04_2ef6799e32af586ec81e974d23f4ee14_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-04_2ef6799e32af586ec81e974d23f4ee14_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-04_2ef6799e32af586ec81e974d23f4ee14_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files\function\necessary.exe"C:\Program Files\function\necessary.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2224
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD5c53b8ac917334a9082419f1d1cabfb4c
SHA19cf12f3b39edd6bacb74344bcccbd7b843786918
SHA2563c3836839bb5b705c814ac369ace55115d4c98bd7a9aa4ae46bbafb02a79a3d1
SHA512f5bcb5274ca3dee29f0b387ed79eedaf2eb44a5e8913488e1af8c63b88ab50dc6fb613267026757f1b84f79bceabb4f6321feb684dd04cc6359d7008c504aaa2