Analysis
-
max time kernel
145s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-04-2024 20:34
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-09_436ed4e7cc4239cf051b76dcc38baa79_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-09_436ed4e7cc4239cf051b76dcc38baa79_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-09_436ed4e7cc4239cf051b76dcc38baa79_icedid.exe
-
Size
419KB
-
MD5
436ed4e7cc4239cf051b76dcc38baa79
-
SHA1
d324f98f8d4e839ea7eabf2395dee74b966ec891
-
SHA256
af351be9c2b397374d81c8293a46b7d422bf84df75988d1fa5818b82b76e105b
-
SHA512
d4e59fd4176dec675e69f22ba8cb64ee2795424badf9e242fcae09294670fec2c8ac26aa0b784f5b5b359c37750830035d07d61ce50d1a9d4d14a3bdfd9ebb5a
-
SSDEEP
12288:tplrVbDdQaqdS/ofraFErH8uB2Wm0SX/Nr5FU:PxRQ+Fucuvm0a/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3804 demonstrates.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\customizing\demonstrates.exe 2024-04-09_436ed4e7cc4239cf051b76dcc38baa79_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2200 2024-04-09_436ed4e7cc4239cf051b76dcc38baa79_icedid.exe 2200 2024-04-09_436ed4e7cc4239cf051b76dcc38baa79_icedid.exe 2200 2024-04-09_436ed4e7cc4239cf051b76dcc38baa79_icedid.exe 2200 2024-04-09_436ed4e7cc4239cf051b76dcc38baa79_icedid.exe 3804 demonstrates.exe 3804 demonstrates.exe 3804 demonstrates.exe 3804 demonstrates.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2200 wrote to memory of 3804 2200 2024-04-09_436ed4e7cc4239cf051b76dcc38baa79_icedid.exe 86 PID 2200 wrote to memory of 3804 2200 2024-04-09_436ed4e7cc4239cf051b76dcc38baa79_icedid.exe 86 PID 2200 wrote to memory of 3804 2200 2024-04-09_436ed4e7cc4239cf051b76dcc38baa79_icedid.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-09_436ed4e7cc4239cf051b76dcc38baa79_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-09_436ed4e7cc4239cf051b76dcc38baa79_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Program Files\customizing\demonstrates.exe"C:\Program Files\customizing\demonstrates.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3804
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
419KB
MD528d9412374abb3b34926d1b72567ab85
SHA1fcbe0b3c3b3a9f57f44233b65e18b0fd2dfeecb6
SHA256f77779fa339b6c8a71be74b4cf61fb6587efa9207a169c9b651d07cb0dcdd2fc
SHA51290babac7964e6fc65a96ced59f5222c450608651ee45a6430b998b154d32805e46012841e7f549c0a2890eba5b9d511319fb4e496aced29d2c53e746ea0bc91e