Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 21:33
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-15_91bee62cf5df66ae70116bb78e390757_icedid.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-04-15_91bee62cf5df66ae70116bb78e390757_icedid.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-15_91bee62cf5df66ae70116bb78e390757_icedid.exe
-
Size
285KB
-
MD5
91bee62cf5df66ae70116bb78e390757
-
SHA1
227c00f6493274385dcf0cd7487bf555061a148f
-
SHA256
780e3957d50a9499f5f3ee5723d354b7114bbe74b0d614b82d778f72142a1901
-
SHA512
d7fe6d35a8e6124fca29f40c7e5a6581b3d34baa5a757941af555662abb4fe9c2968432a2e80fc223b0c0cd998e4026662cc8c0133c1c8b9bc70cfa1940e1f05
-
SSDEEP
3072:lxUm75Fku3eKeO213SJReOqdmErj+HyHnNVIPL/+ybbiW1u46Q7qV3lU8xM:fU8Dk11CJ1qDWUNVIT/bblS9x
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1296 that.exe -
Loads dropped DLL 2 IoCs
pid Process 836 2024-04-15_91bee62cf5df66ae70116bb78e390757_icedid.exe 836 2024-04-15_91bee62cf5df66ae70116bb78e390757_icedid.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\games\that.exe 2024-04-15_91bee62cf5df66ae70116bb78e390757_icedid.exe File opened for modification C:\Program Files\games\that.exe 2024-04-15_91bee62cf5df66ae70116bb78e390757_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 836 2024-04-15_91bee62cf5df66ae70116bb78e390757_icedid.exe 836 2024-04-15_91bee62cf5df66ae70116bb78e390757_icedid.exe 836 2024-04-15_91bee62cf5df66ae70116bb78e390757_icedid.exe 836 2024-04-15_91bee62cf5df66ae70116bb78e390757_icedid.exe 1296 that.exe 1296 that.exe 1296 that.exe 1296 that.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 836 wrote to memory of 1296 836 2024-04-15_91bee62cf5df66ae70116bb78e390757_icedid.exe 28 PID 836 wrote to memory of 1296 836 2024-04-15_91bee62cf5df66ae70116bb78e390757_icedid.exe 28 PID 836 wrote to memory of 1296 836 2024-04-15_91bee62cf5df66ae70116bb78e390757_icedid.exe 28 PID 836 wrote to memory of 1296 836 2024-04-15_91bee62cf5df66ae70116bb78e390757_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_91bee62cf5df66ae70116bb78e390757_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-15_91bee62cf5df66ae70116bb78e390757_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Program Files\games\that.exe"C:\Program Files\games\that.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1296
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
285KB
MD5b11df4658350af2c4e9b541ca0773948
SHA163522ed126f7b00de2c804c114cd6e40cefc2758
SHA2569acce2340e07a4b223f5b910d1f6eb4277f621f826cce0c23f96307d8a3420c6
SHA512818d5a96c7c0477b96327eb04c26812d4557b620e9fb9a8dfc943a5157135026af72e91800331a5fa483bdb1e3a1c615ff880fd0e3f5e0684af69a9272b8f271