Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09-04-2024 15:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-08_1916cc7878131a1e67ce304cea0d9a5d_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-08_1916cc7878131a1e67ce304cea0d9a5d_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-08_1916cc7878131a1e67ce304cea0d9a5d_icedid.exe
-
Size
322KB
-
MD5
1916cc7878131a1e67ce304cea0d9a5d
-
SHA1
57fde3f225993cbdab06666bcf882011d1cd06a5
-
SHA256
f3fdc0881996fd7a702a6d3863265b4c6e8dd897d96642617aa07a64a2a9ff56
-
SHA512
51c87750fc20ffe7574dc1597996b81db55c73eac1a319044dd26260c099b819c15a329e0eba79b2b9ffccd8ca183661450b2522ad18fc4f415ca6bfab982b16
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1260 waysto.exe -
Loads dropped DLL 2 IoCs
pid Process 1996 2024-04-08_1916cc7878131a1e67ce304cea0d9a5d_icedid.exe 1996 2024-04-08_1916cc7878131a1e67ce304cea0d9a5d_icedid.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Before\waysto.exe 2024-04-08_1916cc7878131a1e67ce304cea0d9a5d_icedid.exe File opened for modification C:\Program Files\Before\waysto.exe 2024-04-08_1916cc7878131a1e67ce304cea0d9a5d_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1996 2024-04-08_1916cc7878131a1e67ce304cea0d9a5d_icedid.exe 1996 2024-04-08_1916cc7878131a1e67ce304cea0d9a5d_icedid.exe 1996 2024-04-08_1916cc7878131a1e67ce304cea0d9a5d_icedid.exe 1996 2024-04-08_1916cc7878131a1e67ce304cea0d9a5d_icedid.exe 1260 waysto.exe 1260 waysto.exe 1260 waysto.exe 1260 waysto.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1996 wrote to memory of 1260 1996 2024-04-08_1916cc7878131a1e67ce304cea0d9a5d_icedid.exe 28 PID 1996 wrote to memory of 1260 1996 2024-04-08_1916cc7878131a1e67ce304cea0d9a5d_icedid.exe 28 PID 1996 wrote to memory of 1260 1996 2024-04-08_1916cc7878131a1e67ce304cea0d9a5d_icedid.exe 28 PID 1996 wrote to memory of 1260 1996 2024-04-08_1916cc7878131a1e67ce304cea0d9a5d_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-08_1916cc7878131a1e67ce304cea0d9a5d_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-08_1916cc7878131a1e67ce304cea0d9a5d_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Program Files\Before\waysto.exe"C:\Program Files\Before\waysto.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1260
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
322KB
MD5b3d3d38b586c5e734ad31aa3a95416a3
SHA1a8c64d94158c79247ea576cfcff0ab76b760bf7c
SHA25678aa9c1bfb0025a14fb90d3fc2b8b9588bb875aedb453ce5f3639a05b2606f38
SHA5127bb5b3211b2a13b0d714705167a7fe14f0a5d30e282d21ade00c0a813279958d95530eaa9bb390e7f231cd20e4dc9d26550a76ca76a414879e804ecb83523266