Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
04/04/2024, 23:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-04_2ef6799e32af586ec81e974d23f4ee14_icedid.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-04_2ef6799e32af586ec81e974d23f4ee14_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-04_2ef6799e32af586ec81e974d23f4ee14_icedid.exe
-
Size
380KB
-
MD5
2ef6799e32af586ec81e974d23f4ee14
-
SHA1
c6c6dce5a0a6563f3c181eeef39c9d79fe7bea0c
-
SHA256
e3b4b558785ff343c7fa6dc6fed4eddb45b0639f68a1121fc99065a640ef973d
-
SHA512
476987fd5a9b879ab21b4279b34bb117b3777e9b03a0ed4a6b03ed514f571b6b7f0ff7ae7792ca996bc1237ed3c667a54c96682f320d841e57de17df461ece63
-
SSDEEP
6144:4plrlbbDdQaqd2X/96fr3KFEUGjr8uB2WgcA0cpXEVNrvGZ4FUqm6:4plrVbDdQaqdS/ofraFErH8uB2Wm0SXj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2632 components.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\system\components.exe 2024-04-04_2ef6799e32af586ec81e974d23f4ee14_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1196 2024-04-04_2ef6799e32af586ec81e974d23f4ee14_icedid.exe 1196 2024-04-04_2ef6799e32af586ec81e974d23f4ee14_icedid.exe 1196 2024-04-04_2ef6799e32af586ec81e974d23f4ee14_icedid.exe 1196 2024-04-04_2ef6799e32af586ec81e974d23f4ee14_icedid.exe 2632 components.exe 2632 components.exe 2632 components.exe 2632 components.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1196 wrote to memory of 2632 1196 2024-04-04_2ef6799e32af586ec81e974d23f4ee14_icedid.exe 88 PID 1196 wrote to memory of 2632 1196 2024-04-04_2ef6799e32af586ec81e974d23f4ee14_icedid.exe 88 PID 1196 wrote to memory of 2632 1196 2024-04-04_2ef6799e32af586ec81e974d23f4ee14_icedid.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-04_2ef6799e32af586ec81e974d23f4ee14_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-04_2ef6799e32af586ec81e974d23f4ee14_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Program Files\system\components.exe"C:\Program Files\system\components.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2632
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD5560cb473c5e16a93f069b1b313bb4f8f
SHA1f3d16db3e61dc968ce9bb4c0c52ac7f306bfaed0
SHA256ba787c314786a4dbca6643e82725ac602a5369e506d2dfaf5a5ffbabd2a70286
SHA512020f30d963651bdab09ea0dcf2d47f21f1eba4db0bf2a83f5f33be98bf0ddc68211a0f733e70a56b772d19f0d04f0c233dc42db4fbbcd1d06b7d34e24a087cae