Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
04/04/2024, 20:29
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-04_5718e5f971c9aa14dc77dea93236fe91_icedid.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
2024-04-04_5718e5f971c9aa14dc77dea93236fe91_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-04_5718e5f971c9aa14dc77dea93236fe91_icedid.exe
-
Size
418KB
-
MD5
5718e5f971c9aa14dc77dea93236fe91
-
SHA1
c45dd71053868a3b3fdca8efa565ce53f98f349f
-
SHA256
2227f5da3243980b8ebfca1d2e41d3d12596923c75e8dbec952b02cc7f16265f
-
SHA512
6cc822b0db54e7c44458cfc83368a74314603569910132f061a566dbd94ec91e03e765da071b5e858942b51f9cc52163c1648c5851a99a4f34faf7e49b57c19e
-
SSDEEP
12288:lplrVbDdQaqdS/ofraFErH8uB2Wm0SX/Nr5FU:XxRQ+Fucuvm0a/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2356 Russian.exe -
Loads dropped DLL 2 IoCs
pid Process 2884 2024-04-04_5718e5f971c9aa14dc77dea93236fe91_icedid.exe 2884 2024-04-04_5718e5f971c9aa14dc77dea93236fe91_icedid.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Brazil\Russian.exe 2024-04-04_5718e5f971c9aa14dc77dea93236fe91_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2884 2024-04-04_5718e5f971c9aa14dc77dea93236fe91_icedid.exe 2884 2024-04-04_5718e5f971c9aa14dc77dea93236fe91_icedid.exe 2884 2024-04-04_5718e5f971c9aa14dc77dea93236fe91_icedid.exe 2884 2024-04-04_5718e5f971c9aa14dc77dea93236fe91_icedid.exe 2356 Russian.exe 2356 Russian.exe 2356 Russian.exe 2356 Russian.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2356 2884 2024-04-04_5718e5f971c9aa14dc77dea93236fe91_icedid.exe 28 PID 2884 wrote to memory of 2356 2884 2024-04-04_5718e5f971c9aa14dc77dea93236fe91_icedid.exe 28 PID 2884 wrote to memory of 2356 2884 2024-04-04_5718e5f971c9aa14dc77dea93236fe91_icedid.exe 28 PID 2884 wrote to memory of 2356 2884 2024-04-04_5718e5f971c9aa14dc77dea93236fe91_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-04_5718e5f971c9aa14dc77dea93236fe91_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-04_5718e5f971c9aa14dc77dea93236fe91_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Program Files\Brazil\Russian.exe"C:\Program Files\Brazil\Russian.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2356
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
419KB
MD59b2643f529b211ff76ce8d48c05ccd40
SHA1880c511fecf01a738bae80d22e2f976eefb78d08
SHA2561b3395c4a486a72f60e73669bad75b0c2b8de12d878864dca360b31c0fd69cfe
SHA5125aafa9df0d6d09d2f200ffcebd00901e7f8b0e30a5e5819cbfc519009d633ab2d8f85128f3bb91f98b63323992653b1ac99fd5f9666330d54951cdbfd2684f01