Analysis
-
max time kernel
90s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06-04-2024 03:51
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-06_66e2c31f61a68a0c6aae52641d6fe683_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-06_66e2c31f61a68a0c6aae52641d6fe683_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-04-06_66e2c31f61a68a0c6aae52641d6fe683_icedid.exe
-
Size
422KB
-
MD5
66e2c31f61a68a0c6aae52641d6fe683
-
SHA1
46372a57fe8e0217c3045ac1bf889315b2d1347d
-
SHA256
70aca7dfa7e5ec4ac219382c57c86015f48924c0aeae758d8d2ce78d370aaa50
-
SHA512
85dce2016916749447a59b1eeb66f2345c8a9c8f5fad52b25d3981036043827bcb8563b109394a93071b3e2c303f70681e7852b544df8b7d925f7d99531a27bd
-
SSDEEP
12288:4plrVbDdQaqdS/KfraFErH8uB2Wm0SX/Nr5FU:kxRW+Fucuvm0a/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3204 alternatives.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\present\alternatives.exe 2024-04-06_66e2c31f61a68a0c6aae52641d6fe683_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2236 2024-04-06_66e2c31f61a68a0c6aae52641d6fe683_icedid.exe 2236 2024-04-06_66e2c31f61a68a0c6aae52641d6fe683_icedid.exe 2236 2024-04-06_66e2c31f61a68a0c6aae52641d6fe683_icedid.exe 2236 2024-04-06_66e2c31f61a68a0c6aae52641d6fe683_icedid.exe 3204 alternatives.exe 3204 alternatives.exe 3204 alternatives.exe 3204 alternatives.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2236 wrote to memory of 3204 2236 2024-04-06_66e2c31f61a68a0c6aae52641d6fe683_icedid.exe 84 PID 2236 wrote to memory of 3204 2236 2024-04-06_66e2c31f61a68a0c6aae52641d6fe683_icedid.exe 84 PID 2236 wrote to memory of 3204 2236 2024-04-06_66e2c31f61a68a0c6aae52641d6fe683_icedid.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-06_66e2c31f61a68a0c6aae52641d6fe683_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-06_66e2c31f61a68a0c6aae52641d6fe683_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files\present\alternatives.exe"C:\Program Files\present\alternatives.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3204
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
422KB
MD57e0a52c9988d31b4a9699f47ee09242e
SHA1bc1109652eede9b5e0038cbbe56136debaefd6ce
SHA2562c3bb351014733d27517487f720eac67370c5f4135a48b5d4276259b9b1a9767
SHA512385e815a81f26a404c077536b68c77d501bdc603e4b97e141efb43b263b456301e0224e1311ebd006c11c5eb91f28d95093efb9d76f6f891a0b8ceedaeda13fc